Federal Office for Information Security (BSI)

BSI TR-02102 Cryptographic Mechanisms

Note: The translations of these Technical Guidelines should be considered as courtesy translations. In principle, the German versions take precedence.

BSI TR-02102-1

Within this Technical Guideline, the BSI presents an assessment of the security of selected cryptographic mechanisms, thereby  giving some longer-term guidance in the selection of suitable cryptographic schemes. However, no claim to completeness is made, i.e. schemes that are not listed are not necessarily viewed as insecure by the BSI. The document primarily addresses developers who are planning the introduction of new cryptographic infrastructures.
BSI TR-02102-1: "Cryptographic Mechanisms: Recommendations and Key Lengths" Version: 2017-01 (PDF, 1MB, File does not meet accessibility standards)

BSI TR-02102-2

This Technical Guideline provides recommendations for the use of the cryptographic protocol Transport Layer Security (TLS). It is used for the secure transmission of information in data networks, whereby particularly the confidentiality, integrity and authenticity of the information transmitted can be protected.
BSI TR-02102-2 "Cryptographic Mechanisms: Recommandations and Key Lengths: Use of Transport Layer Security (TLS)" Version: 2017-01 (PDF, 597KB, File is accessible)

BSI TR-02102-3

This Technical Guideline provides recommendations for the use of cryptographic mechanisms in the IPsec (short for Internet Protocol Security) and IKE (short for Internet Key Exchange) protocols. It contains only recommendations for version 2 of the IKE protocol (IKEv2). In this TR, no statements about IKEv1 are made.
BSI TR-02102-3 "Cryptographic Mechanisms: Recommendations and Key Lengths – Use of Internet Protocol Security (IPsec) and Internet Key Exchange (IKEv2)" Version: 2017-01 (PDF, 731KB, File is accessible)

BSI TR-02102-4

This Technical Guideline provides recommendations for the use of the cryptographic protocol Secure Shell (SSH). This protocol can be used to establish a secure channel within an insecure network.
Technical Guideline TR-02102-4_ Cryptographic Mechanisms: Recommendations and Key Lengths – Use of Secure Shell (SSH) Version: 2017-01 (PDF, 487KB, File is accessible)

Note on the use of cookies

Cookies facilitate the provision of our services. By using our services, you agree that we use cookies. For more information on privacy, please visit the following link Data protection statement

OK