Cryptographic Public Key Length Prediction

被引:0
|
作者
Amain, M. [1 ]
Batten, L. M. [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
关键词
Public key length; RSA cryptosystem; Moore's Law;
D O I
10.1007/978-3-662-48683-2_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the late 1900s, suitable key lengths were determined by cryptographers who considered four main features based on implementation, expected lifespan and associated security. By 2010, recommendations are aimed at governmental and commercial institutions, which take into consideration practical implementations that provide data security. By aggregating the key length predictive data since 1985, we notice that while the figures proposed between 1990 and 2010 increase linearly, those proposed for 2010 to 2050 do not. This motivates us to re-think the factors used as a basis for key length predictions and we initiate this re-evaluation in this paper. Focusing first on implementation, we clarify the meaning of Moore's Law by going back to his original papers and commentary. We then focus on the period 2010-2015, when non-linearity appears, and test Moore's Law based on three different hardware platforms. Our conclusion is that current assumptions about Moore's law are still reasonable and that non-linearity is likely to be caused by other factors which we will investigate in future work.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 50 条
  • [41] Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures
    Baldimtsi, Foteini
    Kiayias, Aggelos
    Samari, Katerina
    IET INFORMATION SECURITY, 2021, 15 (03) : 205 - 222
  • [42] ONLINE PUBLIC KEY CRYPTOGRAPHIC SCHEME FOR DATA SECURITY IN BRIDGE HEALTH MONITORING
    Xu Feng
    Lv Xin
    Jiang Rongyan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (05): : 787 - 795
  • [43] A Public Key Cryptographic method for Denial of Service mitigation in wireless sensor networks
    Arazi, O.
    Qi, H.
    Rose, D.
    2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 51 - 59
  • [44] Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
    Zhou, Yuyang
    Hu, Zhebin
    Li, Fagen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 383 - 396
  • [45] Programming highly parallel reconfigurable architectures for public-key cryptographic applications
    Agosta, Giovanni
    Breveglieri, Luca
    Pelosi, Gerardo
    Sykora, Martino
    di Milano, Politecnico
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 3 - +
  • [46] LINEAR ALGEBRA AND EXTENDED MAPPINGS GENERALIZE PUBLIC KEY CRYPTOGRAPHIC KNAPSACK ALGORITHMS
    DESMEDT, Y
    VANDEWALLE, J
    GOVAERTS, R
    ELECTRONICS LETTERS, 1983, 19 (10) : 379 - 381
  • [47] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Chengyu Hu
    Rupeng Yang
    Pengtao Liu
    Tong Li
    Fanyu Kong
    The Journal of Supercomputing, 2019, 75 : 3099 - 3122
  • [48] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Li, Tong
    Kong, Fanyu
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
  • [49] Selecting Cryptographic Key Sizes
    Arjen K. Lenstra
    Eric R. Verheul
    Journal of Cryptology, 2001, 14 : 255 - 293
  • [50] Cryptographic systems using a self-certified public key based on discrete logarithms
    Shao, Z
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (06): : 233 - 237