We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the most common cryptographic primitives. Although the present paper gives both the current (2012) and last year's (2011) costs, more importantly it provides the tools and infrastructure to derive new data points at any time in the future, while allowing for improvements such as of new algorithmic approaches. Over time the resulting data points will provide valuable insight in the selection of cryptographic key sizes. © Springer-Verlag 2012.
CITATION STYLE
Kleinjung, T., Lenstra, A. K., Page, D., & Smart, N. P. (2012). Using the cloud to determine key strengths. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7668 LNCS, pp. 17–39). https://doi.org/10.1007/978-3-642-34931-7_3
Mendeley helps you to discover research relevant for your work.