Using the cloud to determine key strengths

8Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the most common cryptographic primitives. Although the present paper gives both the current (2012) and last year's (2011) costs, more importantly it provides the tools and infrastructure to derive new data points at any time in the future, while allowing for improvements such as of new algorithmic approaches. Over time the resulting data points will provide valuable insight in the selection of cryptographic key sizes. © Springer-Verlag 2012.

Cite

CITATION STYLE

APA

Kleinjung, T., Lenstra, A. K., Page, D., & Smart, N. P. (2012). Using the cloud to determine key strengths. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7668 LNCS, pp. 17–39). https://doi.org/10.1007/978-3-642-34931-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free