Cryptographic Public Key Length Prediction

被引:0
|
作者
Amain, M. [1 ]
Batten, L. M. [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
关键词
Public key length; RSA cryptosystem; Moore's Law;
D O I
10.1007/978-3-662-48683-2_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the late 1900s, suitable key lengths were determined by cryptographers who considered four main features based on implementation, expected lifespan and associated security. By 2010, recommendations are aimed at governmental and commercial institutions, which take into consideration practical implementations that provide data security. By aggregating the key length predictive data since 1985, we notice that while the figures proposed between 1990 and 2010 increase linearly, those proposed for 2010 to 2050 do not. This motivates us to re-think the factors used as a basis for key length predictions and we initiate this re-evaluation in this paper. Focusing first on implementation, we clarify the meaning of Moore's Law by going back to his original papers and commentary. We then focus on the period 2010-2015, when non-linearity appears, and test Moore's Law based on three different hardware platforms. Our conclusion is that current assumptions about Moore's law are still reasonable and that non-linearity is likely to be caused by other factors which we will investigate in future work.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 50 条
  • [1] A Multivariate Public Key Cryptographic Scheme
    Yuan Feng
    Sun Ying
    Jiang Jijun
    Zhao Shangwei
    Xu Shengwei
    CHINA COMMUNICATIONS, 2014, 11 (12) : 120 - 124
  • [2] A New Public Key Cryptographic Scheme
    Yuan, Feng
    Ou, Haiwen
    Xu, Shengwei
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 1944 - 1947
  • [3] Design of a variable key length cryptographic processor
    Bharathwaj, SV
    Kishore, LN
    Arulalan, MR
    Proceedings of the 4th WSEAS International Conference on Applications of Electrical Engineering, 2005, : 231 - 236
  • [4] Probabilistic model of cryptographic key collisions in relation to the key length
    Van Hecke, T. (tanja.vanhecke@ugent.be), 2016, Applied Probability Trust (41):
  • [5] Improvement over Public Key Cryptographic Algorithm
    Garg, Deepak
    Verma, Seema
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 734 - 739
  • [6] Evolutionary public-key cryptographic circuits
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    NEW FRONTIERS IN APPLIED ARTIFICIAL INTELLIGENCE, 2008, 5027 : 551 - +
  • [7] Watermarking Public-Key Cryptographic Primitives
    Goyal, Rishab
    Kim, Sam
    Manohar, Nathan
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 367 - 398
  • [8] A unified architecture for a public key cryptographic coprocessor
    Wang, Yi
    Maskell, Douglas L.
    Leiwo, Jussipekka
    JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (10) : 1004 - 1016
  • [9] VEHICULAR IMPLEMENTATIONS OF PUBLIC KEY CRYPTOGRAPHIC TECHNIQUES
    ARAZI, B
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 1991, 40 (03) : 646 - 653
  • [10] Certificateless public key encryption with cryptographic reverse firewalls
    Zhou, Yuyang
    Guo, Jing
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 109