If the useful life of the Data Encryption Standard (DES) was about 20 years (1977–1999), how long do you predict the useful life of the Advanced Encryption System (AES) will be? Justify your answer

What will be an ideal response?


Part
of
the
reason
for
the
demise
of
DES
has
been
the
increase
in
computing
power,
so
in
1999
it
became
feasible
to
perform
an
exhaustive
key
search
of
a
56-­?bit
space.
The
AES
key
length
of
128,
192,
or
especially
256
bits
should
be
immune
to
exhaustive
search
for
many
more
years,
even
if
Moore's
law
continues
to
hold
(and
computing
power
doubles
every
1.5
years).
The
result
of
exercise
28
gives
a
figure
for
encryption
(and
brute-­?force
decryption);
the
end
of
AES
occurs
when
2128
times
that
figure
divided
by
2n
(where
n
is
the
number
of
1.5-­?year
periods)
is
short,
for
example,
1
month.

Computer Science & Information Technology

You might also like to view...

A declaration for an enumerated type begins with the __________ key word.

a. enumerated b. enum type c. ENUM d. enum

Computer Science & Information Technology

The top-level node in a TreeView is the_______ node.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In order to insert blank lines using the click and type pointer, position the pointer in a document then:

A) click. B) double-click. C) right-click. D) triple-click.

Computer Science & Information Technology

The ____ print style prints a page for each contact.

A. Card B. Memo C. Phone Directory D. Small Booklet

Computer Science & Information Technology