How long does an average key search take

Assignment Help Basic Computer Science
Reference no: EM131329363

We consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time.

1. Assume that an attacker has a special purpose application specific integrated circuit (ASIC) which checks 5 · 108 keys per second, and she has a budget of $1 million. One ASIC costs $50, and we assume 100% overhead for integrating the ASIC (manufacturing the printed circuit boards, power supply, cooling, etc.). How many ASICs can we run in parallel with the given budget? How long does an average key search take? Relate this time to the age of the Universe, which is about 1010 years.

2. We try now to take advances in computer technology into account. Predicting the future tends to be tricky but the estimate usually applied is Moore's Law, which states that the computer power doubles every 18 months while the costs of integrated circuits stay constant. How many years do we have to wait until a key-search machine can be built for breaking AES with 128 bit with an average search time of 24 hours? Again, assume a budget of $1 million (do not take inflation into account).

Reference no: EM131329363

Questions Cloud

How does the author use religious imagery to stress : How does the author use religious imagery to stress the importance of stewardship of nature? What are three ways an environmental focus has manifested itself in architecture
Which account is increase when you buy merchandise inventory : Which of these is true about the normal balance of an income summary? When using a periodic inventory method, which account is increased when you buy merchandise inventory?
Create a schedule showing the cash inflows and outflows : Create a schedule showing the cash inflows (including interest) and outflows of this fund. How much remains on Spencer's twenty-first birthday?
Calculate the annual end of year loan payment : Calculate the annual end-of-year loan payment.- Prepare a loan amortization schedule showing the interest and principal breakdown of each of the three loan payments.
How long does an average key search take : How many years do we have to wait until a key-search machine can be built for breaking AES with 128 bit with an average search time of 24 hours? Again, assume a budget of $1 million (do not take inflation into account).
Will the storage limit be ever reached in any month : At the current inventory cost of 5%, will the storage limit be ever reached in any month? If not, at what inventory cost % will the storage limit be reached?
What will be your total interest cost : Given these terms, how long (in years) will it take you to fully repay your loan?-  What will be your total interest cost?
Air pollutant - deterministic versus statistical models : What Is An Air Pollutant -  Pollutant Emissions Primary Gaseous Pollutants Primary Particulate Matter Radioactive Pollutants Secondary Gas Pollutants Secondary Particulate Matter Global SOx and NOx Emissions Air Pollution Emissions and Air Quality..
Decrypt the following cipher text : Develop a scheme which operates with the letters A, B,..., Z, represented by the numbers 0,1,...,25. What does the key (stream) look like? What are the encryption and decryption functions?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  First integer of input refers to the total weight the ship

First integer of input refers to the total weight the ship can carry. Second integer refers to the number of cargo present and the rest of the integers represents the individual weight of the cargo

  Detect a negative cycle using the predecessor indices

Suppose that the Floyd-Warshall algorithm terminates after detecting the presence of a negative cycle. At this time, how would you detect a negative cycle using the predecessor indices?

  Components of biztalk server architecture

Problem: Explain the components of Biztalk Server architecture.

  What are the basic components of an electrical motor

Draw a rotary pump and label its parts. Show rotation.

  Cyber-attack using current password

How you would propose protecting your chosen cloud solution from cyber-attack using current password and data protection protocol

  Signature-based intrusion detection can identify previously

The primary difference between network-based IDS and IPS is that an IPS responds to suspected attacks by blocking network traffic, while an IDS only provides notification that suspicious traffic is observed

  Facilities maintaining a hybrid system

What are the drawbacks to facilities maintaining a hybrid system while trying to properly file documents in both digital and paper-based systems?

  What is the role of the dba with respect to security

Explain how a company offering services on the Internet could use public-key encryption to make its order-entry process secure. Describe how you would use DES encryption for the same purpose, and contrast the public-key and DES approaches

  There are 8 servers running red hat linux

There are 8 servers running Red Hat Linux (RHL) 7.3 and 2 running RHL 8.0. At this point, the 2 servers running version 8.0 are only test servers.

  Customers access the abm terminal to deposit

Consider an automated banking system. Customers access the ABM terminal to deposit or withdraw money or pay bills. TrentMoney wants to set up generic ABMs to cash in on transaction fees.

  How many different committees are possible

A committee is to be formed consisting of 5 men and 6 women. If the committee members are to be chosen from 8 men and 9 women, how many different committees are possible?

  How does the mechanism work

1. What is a proxy firewall and how is it different from a network (or transparent) firewall? 2. What does NAT stand for, and how does the mechanism work? Describe what, if any, security NAT provides (or fails to provide). 3. Where would you place ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd