How long does an average key search take

Assignment Help Basic Computer Science
Reference no: EM131330761

For the following, we assume AES with 192-bit key length. Furthermore, let us assume an ASIC which can check 3 · 107 keys per second.

1. If we use 100,000 such ICs in parallel, how long does an average key search take? Compare this period of time with the age of the universe (approx. 1010 years).

2. Assume Moore's Law will still be valid for the next few years, how many years do we have to wait until we can build a key search machine to perform an average key search of AES-192 in 24 hours? Again, assume that we use 100,000 ICs in parallel.

Reference no: EM131330761

Questions Cloud

How long does an average key search take with a single pc : How many key bits are used, if the 8 characters are randomly chosen 7-bit ASCII characters (i.e., the most significant bit is always zero)? How long does an average key search take with a single PC?
Litigation process as a representative : Recommend a plan or strategy to be followed by safety professionals if they become involved in the litigation process as a representative of an employer organization.
Consider supply management options : The aggregate planning problem: A. Should only consider supply management options B. Only affects marketing and production, but human resources is not involved in decisions
Tqm approach for fulfilling customer expectations : Describe how to use a TQM approach for fulfilling customer expectations associated with a new product, and apply principles of TQM in managing a product introduction
How long does an average key search take : Assume Moore's Law will still be valid for the next few years, how many years do we have to wait until we can build a key search machine to perform an average key search of AES-192 in 24 hours? Again, assume that we use 100,000 ICs in parallel.
Determine the amount of investments michael : Formulate a linear programming model that can be used to determine the amount of investments Michael should allocate to each type of fund to maximize the total annual return. How much should be allocated to each type of fund? What is the total annu..
Conversations with precision part leaders : You have held conversations with Precision Part's leaders and obtained the following information, which you want to use in the development of a 4-year strategic management plan.
Determine the content of the unknown file : Briefly describe how it is possible to obtain the unknown initialization vector and how you are able to determine the content of the unknown file.
How the development of information technology has help : Post your thoughts on how the development of information technology has helped address the concerns about patient safety raised in the "To Err Is Human" report. Summarize how informatics has assisted in improving health care safety in your organiz..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the length of the resulting ciphertext

3 Say CBC-mode encryption is used with a block cipher having a 256-bit key and 128-bit block length to encrypt a 1024-bit message. What is the length of the resulting ciphertext?

  How many give us a perfect matching

how many give us a perfect matching? Give a simple test for distinguishing those orders that do give the perfect matching from those that do not.

  Compute the key pairs kao and kbo

We reconsider the Diffie-Hellman key exchange protocol. Assume now that Oscar runs an active man-in-the-middle attack against the key exchange as explained in Sect. 13.3.1.

  What is the value of security and control

What is the value of security and control? (Explain how security and control provide value for businesses.)

  What is the value of security and control

What is the value of security and control? (Explain how security and control provide value for businesses.)

  If you need a 3-input nand gate andhave

If you need a 3-input NAND gate andhave only 4-input NANDs, gates, what can you do?

  Assignment instructions

Assignment Instructions

  Vulnerability assessment matrix

Vulnerability Assessment Matrix

  The types of information that should be placed in a table

The types of information that should be placed in a table

  Program that reads n characters from a keyboard

Write an ARM program that reads n characters from a keyboard and echoes them back to a display after pushing them onto a user stack as they are read. Use register R6 as the stack pointer. The count value n is contained in memory word location N.

  Use of equity financing over debt financing accurate

Christopher argues that the company should increase its use of equity financing because debt costs 25% while equity only costs 20% and thus, equity is cheaper. Is Christopher's analysis of the cost of equity, debt, and decision to increase the use..

  Explain the conceptual model employed in the design

Explain the conceptual model employed in the design of these types. Describe the analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd