You are not logged in.

Cryptographic public key length prediction

Amain, M. and Batten, L.M. 2015, Cryptographic public key length prediction. In Niu, Wenjia, Li, Gang, Liu, Jiqiang, Tan, Jianlong, Li, Guo, Han, Zhen and Batten, Lynn (ed), Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Springer, Berlin, Germany, pp.27-35, doi: 10.1007/978-3-662-48683-2_3.

Attached Files
Name Description MIMEType Size Downloads

Title Cryptographic public key length prediction
Author(s) Amain, M.
Batten, L.M.
Title of book Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings
Editor(s) Niu, Wenjia
Li, Gang
Liu, Jiqiang
Tan, Jianlong
Li, Guo
Han, Zhen
Batten, Lynn
Publication date 2015
Series Communications in computer and information science; 557
Chapter number 3
Total chapters 36
Start page 27
End page 35
Total pages 9
Publisher Springer
Place of Publication Berlin, Germany
Keyword(s) public key length
RSA cyrptosystem
Moore's law
Summary In the late 1900s, suitable key lengths were determined by cryptographers who considered four main features based on implementation, expected lifespan and associated security. By 2010, recommendations are aimed at governmental and commercial institutions, which take into consideration practical implementations that provide data security. By aggregating the key length predictive data since 1985, we notice that while the figures proposed between 1990 and 2010 increase linearly, those proposed for 2010 to 2050 do not. This motivates us to re-think the factors used as a basis for key length predictions and we initiate this re-evaluation in this paper. Focusing first on implementation, we clarify the meaning of Moore’s Law by going back to his original papers and commentary. We then focus on the period 2010-2015, when non-linearity appears, and test Moore’s Law based on three different hardware platforms. Our conclusion is that current assumptions about Moore’s law are still reasonable and that non-linearity is likely to be caused by other factors which we will investigate in future work.
ISBN 9783662486825
ISSN 1865-0929
1865-0937
Language eng
DOI 10.1007/978-3-662-48683-2_3
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2015, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30082866

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 118 Abstract Views, 5 File Downloads  -  Detailed Statistics
Created: Fri, 15 Apr 2016, 14:57:34 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.