em:20482030
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
em:20482030 [2023/11/09 16:27] – [Where Are We Now?] Typo b.walzer | em:20482030 [2023/12/10 21:54] (current) – Typo b.walzer | ||
---|---|---|---|
Line 6: | Line 6: | ||
=====Where did the 2030 cutoff come from?===== | =====Where did the 2030 cutoff come from?===== | ||
- | I am reasonably certain that the ideas here came from an influential paper released in 2004 by Arjen K. Lenstra((https:// | + | I am reasonably certain that the ideas here came from an influential paper released in 2004 by Arjen K. Lenstra(([[https:// |
^ Modulus Bit Length ^ Conservative Year ^ Optimistic Year ^ | ^ Modulus Bit Length ^ Conservative Year ^ Optimistic Year ^ | ||
Line 166: | Line 166: | ||
Some examples of symmetric encryption schemes are: [[wp> | Some examples of symmetric encryption schemes are: [[wp> | ||
- | One extra key bit doubles the difficulty here. That's 128-112=16 difficulty doublings over the 11 year period. So an implicit assumption that the capability available for breaking | + | One extra key bit doubles the difficulty here. That's 128-112=16 difficulty doublings over the 11 year period. So an implicit assumption that the capability available for breaking |
The idea that the algorithmic capability against symmetric encryption might be doubling every 18 months is fairly surprising. A regular increase here is not something that is normally assumed. Perhaps there was some sort of " | The idea that the algorithmic capability against symmetric encryption might be doubling every 18 months is fairly surprising. A regular increase here is not something that is normally assumed. Perhaps there was some sort of " |
em/20482030.1699547270.txt.gz · Last modified: 2023/11/09 16:27 by b.walzer