Published in

Springer, Lecture Notes in Computer Science, p. 17-39, 2012

DOI: 10.1007/978-3-642-34931-7_3

Links

Tools

Export citation

Search in Google Scholar

Using the Cloud to Determine Key Strengths

Journal article published in 2011 by Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Red circle
Preprint: archiving forbidden
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the most common cryptographic primitives. Although the present paper gives both the current (2012) and last year’s (2011) costs, more importantly it provides the tools and infrastructure to derive new data points at any time in the future, while allowing for improvements such as of new algorithmic approaches. Over time the resulting data points will provide valuable insight in the selection of cryptographic key sizes.