File(s) under permanent embargo
Cryptographic public key length prediction
In the late 1900s, suitable key lengths were determined by cryptographers who considered four main features based on implementation, expected lifespan and associated security. By 2010, recommendations are aimed at governmental and commercial institutions, which take into consideration practical implementations that provide data security. By aggregating the key length predictive data since 1985, we notice that while the figures proposed between 1990 and 2010 increase linearly, those proposed for 2010 to 2050 do not. This motivates us to re-think the factors used as a basis for key length predictions and we initiate this re-evaluation in this paper. Focusing first on implementation, we clarify the meaning of Moore’s Law by going back to his original papers and commentary. We then focus on the period 2010-2015, when non-linearity appears, and test Moore’s Law based on three different hardware platforms. Our conclusion is that current assumptions about Moore’s law are still reasonable and that non-linearity is likely to be caused by other factors which we will investigate in future work.
History
Title of book
Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedingsVolume
557Series
Communications in computer and information science; 557Chapter number
3Pagination
27 - 35Publisher
SpringerPlace of publication
Berlin, GermanyPublisher DOI
ISSN
1865-0929eISSN
1865-0937ISBN-13
9783662486825Language
engPublication classification
B Book chapter; B1 Book chapterCopyright notice
2015, SpringerExtent
36Editor/Contributor(s)
W Niu, G Li, J Liu, J Tan, G Li, Z Han, L BattenUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC