Security first absolutely, but did you read the insane requirements?
Elliptic Curve and 3072 bit keys... What are we guarding against, quantum computers? What's wrong with good old AES 256?
AES 256 is vulnerable. Granted, proper implementations have proven to be uncrackable without significant cryptanalysis ... but many do not use adequate implementations / algorithms and it's relatively simple to attack / break that weak link without being concerned with the size of 256-bit key lengths.
3072-bits might be a 'bit' excessive, but I don't think things like ECDSA are (Elliptic Curve Digital Signature Algorithm). Considering, the successful attack on AES 256 is more than a few years old and is actively being worked on, a practical break could occur any day (it's highly possible that one already privately exists). But 'when' that indeed does happen, a simple firmware update would not address the problem when already installed hardware cannot handle the switch.
Personally, I would've said 1024-bits minimum but the hardware must be able to handle 2048-bits.
-- Edit --
https://en.wikipedia.org/wiki/Biclique_attack
Last edited: