
## Review A dedicated reviewer checked the rule description successfully for: - [x] logical errors and incorrect information - [x] information gaps and missing content - [x] text style and tone - [x] PR summary and labels follow [the guidelines](https://github.com/SonarSource/rspec/#to-modify-an-existing-rule) --------- Co-authored-by: hendrik-buchwald-sonarsource <64110887+hendrik-buchwald-sonarsource@users.noreply.github.com>
9 lines
416 B
Plaintext
9 lines
416 B
Plaintext
The following code examples either explicitly or implicitly generate keys.
|
|
Note that there are differences in the size of the keys depending on the
|
|
algorithm.
|
|
|
|
Due to the mathematical properties of the algorithms, the security requirements
|
|
for the key size vary depending on the algorithm. +
|
|
For example, a 256-bit ECC key provides about the same level of security as a
|
|
3072-bit RSA key and a 128-bit symmetric key.
|