Cryptographic public key length prediction


Autoria(s): Amain, M.; Batten, L.M.
Contribuinte(s)

Niu, Wenjia

Li, Gang

Liu, Jiqiang

Tan, Jianlong

Li, Guo

Han, Zhen

Batten, Lynn

Data(s)

01/01/2015

Resumo

In the late 1900s, suitable key lengths were determined by cryptographers who considered four main features based on implementation, expected lifespan and associated security. By 2010, recommendations are aimed at governmental and commercial institutions, which take into consideration practical implementations that provide data security. By aggregating the key length predictive data since 1985, we notice that while the figures proposed between 1990 and 2010 increase linearly, those proposed for 2010 to 2050 do not. This motivates us to re-think the factors used as a basis for key length predictions and we initiate this re-evaluation in this paper. Focusing first on implementation, we clarify the meaning of Moore’s Law by going back to his original papers and commentary. We then focus on the period 2010-2015, when non-linearity appears, and test Moore’s Law based on three different hardware platforms. Our conclusion is that current assumptions about Moore’s law are still reasonable and that non-linearity is likely to be caused by other factors which we will investigate in future work.

Identificador

http://hdl.handle.net/10536/DRO/DU:30082866

Idioma(s)

eng

Publicador

Springer

Relação

http://dro.deakin.edu.au/eserv/DU:30082866/amain-cyrptographicpublic-2015.pdf

http://dro.deakin.edu.au/eserv/DU:30082866/amain-cyrptographicpublic-evid-2015.pdf

http://www.dx.doi.org/10.1007/978-3-662-48683-2_3

Direitos

2015, Springer

Palavras-Chave #public key length #RSA cyrptosystem #Moore's law
Tipo

Book Chapter