Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-8267319 Use Larger Default Key Sizes and Algorithms Based on CNSA 1.0
  3. JDK-8283475

Release Note: Use Larger Default key Sizes if not Explicitly Specified

XMLWordPrintable

      JDK providers use provider-specific default values if the caller does not specify a key size when using a `KeyPairGenerator` or `KeyGenerator` object to generate a key pair or secret key. With this enhancement, the default key sizes for various crypto algorithms have been increased as follows:
      - RSA, RSASSA-PSS, DH: from 2048 to 3072
      - EC: from 256 to 384
      - AES: from 128 to 256 (if permitted by crypto policy), falls back to 128 otherwise.

      In addition, the `jarsigner` tool will now use SHA-384 instead of SHA-256 as the default digest algorithm. The default signature algorithm for the `jarsigner` tool has also been adjusted accordingly. SHA-384 is used instead of SHA-256 except for longer key sizes whose security strength matches SHA-512. Note that for DSA keys, `jarsigner` will continue using SHA256withDSA as the default signature algorithm. This ensures maximum interoperability with older JDK releases. For more details, please refer to the `keytool` and `jarsigner` documentation.

            valeriep Valerie Peng
            valeriep Valerie Peng
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: