When key size grows :
the mathematical problem is harder to solve more security .
The hardness of the mathematical problem depends on the
algorithm used (do we know the best one ?)
(legitimate) computations is more awkward less efficient .
A compromise is to be found when deploying public-key
cryptography.