Cryptographic Public Key Length Prediction

被引:0
|
作者
Amain, M. [1 ]
Batten, L. M. [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
关键词
Public key length; RSA cryptosystem; Moore's Law;
D O I
10.1007/978-3-662-48683-2_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the late 1900s, suitable key lengths were determined by cryptographers who considered four main features based on implementation, expected lifespan and associated security. By 2010, recommendations are aimed at governmental and commercial institutions, which take into consideration practical implementations that provide data security. By aggregating the key length predictive data since 1985, we notice that while the figures proposed between 1990 and 2010 increase linearly, those proposed for 2010 to 2050 do not. This motivates us to re-think the factors used as a basis for key length predictions and we initiate this re-evaluation in this paper. Focusing first on implementation, we clarify the meaning of Moore's Law by going back to his original papers and commentary. We then focus on the period 2010-2015, when non-linearity appears, and test Moore's Law based on three different hardware platforms. Our conclusion is that current assumptions about Moore's law are still reasonable and that non-linearity is likely to be caused by other factors which we will investigate in future work.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 50 条
  • [21] Privacy Preserving Computations without Public Key Cryptographic Operation
    Chida, Koji
    Takahashi, Katsumi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2008, 5312 : 184 - 200
  • [22] Radio Frequency Public Key Generator for Digital Cryptographic Application
    Kang, Jusung
    Kim, Young-Sik
    Lee, Heung-No
    IEEE ACCESS, 2023, 11 : 140867 - 140880
  • [23] Performance Analysis of Public key Cryptographic Systems RSA and NTRU
    Challa, Narasimham
    Pradhan, Jayaram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (08): : 87 - 96
  • [24] FPGA implementation of RSA public-key cryptographic coprocessor
    Hani, MK
    Lin, TS
    Shaikh-Husin, N
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B6 - B11
  • [25] CRYPTOGRAPHIC MASTER-KEY-GENERATION SCHEME AND ITS APPLICATION TO PUBLIC KEY DISTRIBUTION
    KIESLER, T
    HARN, L
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (03): : 203 - 206
  • [26] A SECURITY ANALYSIS OF PUBLIC KEY CRYPTOGRAPHIC SYSTEMS USED FOR ELECTRONIC SIGNATURE
    Neacsu, Eugen
    Schiopu, Paul
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2021, 83 (01): : 135 - 146
  • [27] An efficient scalable and hybrid arithmetic unit for public key cryptographic applications
    Yu, SuJung
    Kim, MoonGyung
    Heo, SeokWon
    Song, JooSeok
    Lee, YongSurk
    IEICE ELECTRONICS EXPRESS, 2007, 4 (14): : 461 - 466
  • [28] New knapsack-type public-key cryptographic algorithm
    Zhang, Wei-Dong
    Wang, Bao-Cang
    Hu, Yu-Pu
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2009, 36 (03): : 506 - 511
  • [29] Public-key cryptographic system based on generalized satisfiability problem
    Potseluevskaya E.A.
    Journal of Mathematical Sciences, 2011, 172 (5) : 751 - 758
  • [30] Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
    Lyubashevsky, Vadim
    Palacio, Adriana
    Segev, Gil
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 382 - +