2018
DOI: 10.1007/s12083-018-0641-5
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…At the time of writing (2019), and since the mid-nineties, 7 bytes of entropy are not sufficient for a cryptographic key [11]. Prior work has succeeded in brute forcing keys with 7 bytes of entropy with increasing efficacy, e.g., specialized hardware [34] and cloud infrastructure [54]. Furthermore, considering current best practices [8], any key with less than 14 bytes of entropy is not considered secure for symmetric encryption.…”
Section: Brute Forcing the Low Entropy Ble Long Term Keymentioning
confidence: 99%
“…At the time of writing (2019), and since the mid-nineties, 7 bytes of entropy are not sufficient for a cryptographic key [11]. Prior work has succeeded in brute forcing keys with 7 bytes of entropy with increasing efficacy, e.g., specialized hardware [34] and cloud infrastructure [54]. Furthermore, considering current best practices [8], any key with less than 14 bytes of entropy is not considered secure for symmetric encryption.…”
Section: Brute Forcing the Low Entropy Ble Long Term Keymentioning
confidence: 99%
“…The development of IT, including virtual reality, block chain using P2P networking, and intelligent ones based on learning algorithms, smartly solves transportation problems, environmental problems, and inefficiencies in facilities [1][2][3][4]. Social change due to rapidly changing technology is affecting elementary and middle school computer science (CS) education.…”
Section: Introductionmentioning
confidence: 99%
“…Also, we found vmTorrent (Reich et al, 2012) aims to scalably minimise time needed for cloud-based VMs to boot and load critical applications. According to Yoon et al (2018), the task running time of a peer on VM is an important factor. If the execution time of the single task is too short, the communication traffic is increased compared to the amount of calculation on the server.…”
Section: Introductionmentioning
confidence: 99%