[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

How long will an encryption key be in 30 years

Posted on 2014-08-10
4
Medium Priority
?
955 Views
Last Modified: 2014-08-10
I am trying to understand the correlation between encryption key length and processing speeds.
If I assume that the total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year....and if a symmetric session key needs to be 100 bits long to be considered strong today. How long will a symmetric session key have to be in 10, 20 or even 30 years to be considered strong?
0
Comment
Question by:Milkus1
  • 2
  • 2
4 Comments
 
LVL 85

Expert Comment

by:ozo
ID: 40252315
Assuming processing speed doubling every year, and assuming a symmetric session key needs to be 100 bits long to be considered strong today,
then a symmetric session key would need to be 110 bits long to be considered strong in 10 years,
120 bits in 20 years,
130 bits in 30 years
0
 

Author Comment

by:Milkus1
ID: 40252355
Thanks ozo, I now get the concept.
Double the speed requires just doubling the permutations possible.
I  how do I write this as a formula?
0
 
LVL 85

Accepted Solution

by:
ozo earned 920 total points
ID: 40252369
Assuming processing speed doubling every T0, and assuming a symmetric session key needs to be N bits long to be considered strong today,
then a symmetric session key would need to be N+T1/T0 bits long to be considered strong in T1.
0
 

Author Closing Comment

by:Milkus1
ID: 40252439
Thanks oro...much clearer now.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month18 days, 11 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question