2021 IEEE 12th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2021
DOI: 10.1109/uemcon53757.2021.9666530
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating True Cryptographic Key Space Size

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
0
0
Order By: Relevance
“…Among these keys are the RSA secret key (e, n), the additive homomorphic encryption key (n 1 , g), three keys from the 2D chaotic map (a, c, f ), the Paillier public key (µ, λ), and the logistic Sierpinski keys (b , k i ). The established guidelines from IEEE [45] dictate that the standard key space should exceed 10 15×keys ≈ 2 100 , and our proposed encryption techniques meet this requirement, as confirmed by Equation ( 16). keys = 10 15×8 ≈ 2 398 .…”
Section: Brute-force Attack 441 Key-space Analysismentioning
confidence: 58%
“…Among these keys are the RSA secret key (e, n), the additive homomorphic encryption key (n 1 , g), three keys from the 2D chaotic map (a, c, f ), the Paillier public key (µ, λ), and the logistic Sierpinski keys (b , k i ). The established guidelines from IEEE [45] dictate that the standard key space should exceed 10 15×keys ≈ 2 100 , and our proposed encryption techniques meet this requirement, as confirmed by Equation ( 16). keys = 10 15×8 ≈ 2 398 .…”
Section: Brute-force Attack 441 Key-space Analysismentioning
confidence: 58%
“…In this study, a total of three different keys were utilized; these secret keys are m k obtained from the fuzzy number, 1 k obtained from the hybrid map of the logistic and sine maps, and 2 k obtained from the hybrid of the triangular membership function and the Hénon map. Ideally, key space used in encryption should be larger than 100 2 [34] to handle brute force attack. According to the IEEE [34] standard, the precision number of floating points is 15 10 .…”
Section: Secret Key Space Analysismentioning
confidence: 99%
“…Ideally, key space used in encryption should be larger than 100 2 [34] to handle brute force attack. According to the IEEE [34] standard, the precision number of floating points is 15 10 . As part of this experiment, where three floating-point keys are utilized, the total number of key spaces can be approximated using Equation (26).…”
Section: Secret Key Space Analysismentioning
confidence: 99%