How long does an average key search take

Assignment Help Basic Computer Science
Reference no: EM131329363

We consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time.

1. Assume that an attacker has a special purpose application specific integrated circuit (ASIC) which checks 5 · 108 keys per second, and she has a budget of $1 million. One ASIC costs $50, and we assume 100% overhead for integrating the ASIC (manufacturing the printed circuit boards, power supply, cooling, etc.). How many ASICs can we run in parallel with the given budget? How long does an average key search take? Relate this time to the age of the Universe, which is about 1010 years.

2. We try now to take advances in computer technology into account. Predicting the future tends to be tricky but the estimate usually applied is Moore's Law, which states that the computer power doubles every 18 months while the costs of integrated circuits stay constant. How many years do we have to wait until a key-search machine can be built for breaking AES with 128 bit with an average search time of 24 hours? Again, assume a budget of $1 million (do not take inflation into account).

Reference no: EM131329363

Questions Cloud

How does the author use religious imagery to stress : How does the author use religious imagery to stress the importance of stewardship of nature? What are three ways an environmental focus has manifested itself in architecture
Which account is increase when you buy merchandise inventory : Which of these is true about the normal balance of an income summary? When using a periodic inventory method, which account is increased when you buy merchandise inventory?
Create a schedule showing the cash inflows and outflows : Create a schedule showing the cash inflows (including interest) and outflows of this fund. How much remains on Spencer's twenty-first birthday?
Calculate the annual end of year loan payment : Calculate the annual end-of-year loan payment.- Prepare a loan amortization schedule showing the interest and principal breakdown of each of the three loan payments.
How long does an average key search take : How many years do we have to wait until a key-search machine can be built for breaking AES with 128 bit with an average search time of 24 hours? Again, assume a budget of $1 million (do not take inflation into account).
Will the storage limit be ever reached in any month : At the current inventory cost of 5%, will the storage limit be ever reached in any month? If not, at what inventory cost % will the storage limit be reached?
What will be your total interest cost : Given these terms, how long (in years) will it take you to fully repay your loan?-  What will be your total interest cost?
Air pollutant - deterministic versus statistical models : What Is An Air Pollutant -  Pollutant Emissions Primary Gaseous Pollutants Primary Particulate Matter Radioactive Pollutants Secondary Gas Pollutants Secondary Particulate Matter Global SOx and NOx Emissions Air Pollution Emissions and Air Quality..
Decrypt the following cipher text : Develop a scheme which operates with the letters A, B,..., Z, represented by the numbers 0,1,...,25. What does the key (stream) look like? What are the encryption and decryption functions?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd