评估真正的加密密钥空间大小

Albert H Carlson, Garret Gang, Torsten Gang, Bhaskar Ghosh, I. Dutta
{"title":"评估真正的加密密钥空间大小","authors":"Albert H Carlson, Garret Gang, Torsten Gang, Bhaskar Ghosh, I. Dutta","doi":"10.1109/UEMCON53757.2021.9666530","DOIUrl":null,"url":null,"abstract":"Cybersecurity professionals have relied on the key space of a cipher to compare encryption algorithms and select the best encryptions for transmitted data. Peer reviewed strong ciphers have been assumed to maintain strength for all messages. It is thought that only brute force attacks can break these ciphers, so the key space calculation for these algorithms uses the maximum key space to determine the unicity distance. Unfortunately, the key space is heavily dependent on the user and habits of the user, as well as the content of the message. In this paper, we present factors that affect the key space size and show that the effects of these factors can seriously decrease the security of a cipher for a particular message. By considering these factors, a cybersecurity practitioner can properly assess vulnerability and choose the best security for that message.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Evaluating True Cryptographic Key Space Size\",\"authors\":\"Albert H Carlson, Garret Gang, Torsten Gang, Bhaskar Ghosh, I. Dutta\",\"doi\":\"10.1109/UEMCON53757.2021.9666530\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cybersecurity professionals have relied on the key space of a cipher to compare encryption algorithms and select the best encryptions for transmitted data. Peer reviewed strong ciphers have been assumed to maintain strength for all messages. It is thought that only brute force attacks can break these ciphers, so the key space calculation for these algorithms uses the maximum key space to determine the unicity distance. Unfortunately, the key space is heavily dependent on the user and habits of the user, as well as the content of the message. In this paper, we present factors that affect the key space size and show that the effects of these factors can seriously decrease the security of a cipher for a particular message. By considering these factors, a cybersecurity practitioner can properly assess vulnerability and choose the best security for that message.\",\"PeriodicalId\":127072,\"journal\":{\"name\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON53757.2021.9666530\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON53757.2021.9666530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

网络安全专业人员依靠密码的密钥空间来比较加密算法,并为传输数据选择最佳加密。同行评审的强密码被认为对所有消息保持强度。一般认为只有蛮力攻击才能破解这些密码,因此这些算法的密钥空间计算使用最大密钥空间来确定唯一距离。不幸的是,键空间严重依赖于用户和用户的习惯,以及消息的内容。在本文中,我们提出了影响密钥空间大小的因素,并表明这些因素的影响会严重降低特定消息的密码安全性。通过考虑这些因素,网络安全从业者可以正确地评估漏洞并为该消息选择最佳安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Evaluating True Cryptographic Key Space Size
Cybersecurity professionals have relied on the key space of a cipher to compare encryption algorithms and select the best encryptions for transmitted data. Peer reviewed strong ciphers have been assumed to maintain strength for all messages. It is thought that only brute force attacks can break these ciphers, so the key space calculation for these algorithms uses the maximum key space to determine the unicity distance. Unfortunately, the key space is heavily dependent on the user and habits of the user, as well as the content of the message. In this paper, we present factors that affect the key space size and show that the effects of these factors can seriously decrease the security of a cipher for a particular message. By considering these factors, a cybersecurity practitioner can properly assess vulnerability and choose the best security for that message.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信