• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

Question 1

October 28, 2021 by David Lanter 7 Comments

The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year.  Today a symmetric session key needs to be 100 bits long to be considered strong.  How long will a symmetric session key have to be in 30 years to be considered strong? (Hint: Consider how much longer decryption takes if the key length is increased by a single bit.) Explain.

Filed Under: Unit 11: Cryptography, Public Key Encryption and Digital Signature Tagged With:

Reader Interactions

Comments

  1. Yangyuan Lin says

    October 29, 2021 at 9:52 pm

    Symmetric session key will require one bit added each year because the total processing speed of microprocessors is doubling roughly every year,therefore,30 years to be considered 130 bits long.

    Log in to Reply
    • Shubham Patil says

      October 31, 2021 at 8:38 pm

      Lin,

      I found this interesting that a 128-bit key has 340,282,366,920,938,463,463,374,607,431,768,211,456 encryption code possibilities. As you can imagine, a ‘brute force’ attack (in which an attacker tries every possible key until they find the right one) would take quite a bit of time to break a 128-bit key.

      Log in to Reply
  2. Shubham Patil says

    October 31, 2021 at 8:19 pm

    Symmetric encryption (or pre-shared key encryption) uses a single key to both encrypt and decrypt data. Both the sender and the receiver need the same key to communicate.

    If the total processing speed of microprocessors is doubling every year and the current symmetric key session is 100 bits, after 30 years it would 130 bits as one bit is added every year. The larger the key size, the harder the key is to crack.

    Log in to Reply
    • Elizabeth Gutierrez says

      November 1, 2021 at 8:23 pm

      Hi Shubham,

      I’m glad that you brought up encryption because it is essential to ensure the security of data. Our readings address that a symmetric session key allows the encryptor to set a ket that matches the one used for decryption. However, as you mentioned the idea of brute force in one of your comments, the form of encryption algorithm used is vulnerable and can be exploited by brute force; this can occur via a dictionary list or the generation of random character values that are tested against the data provided. With this in mind, it provides me with a better understanding for why a larger key size is beneficial given that they are harder to crack.

      Log in to Reply
  3. Elizabeth Gutierrez says

    October 31, 2021 at 10:50 pm

    The addition of one bit to the length of the symmetric key in 1 year is more than enough to make the key strong because each additional bit doubles the effective search time. Even by doubling the speed, the processor can still not crack the number of combinations that will be formed. Therefore, if a bit is added to the key length per year, the length of the symmetric session key will be 130 bits after 30 years I believe you can also find the length of the session key by using the compound interest formula.

    Log in to Reply
  4. Oluwaseun Soyomokun says

    October 31, 2021 at 11:07 pm

    A symmetric session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Session keys are sometimes called symmetric keys because the same key is used for both encryption and decryption.
    At this point a 128 bit symmetric session keys encryption algorithms requires a 100 bit character length to be strong. The longer the secret key, the harder it is for an attacker to guess via brute force attack. However, AES-256 is not just twice as strong as AES-128. So AES-128 has an effective key space of 2^64, by considering the clock rate and circuits in adding a bit to the algorithm length been added every year. I will be 130bits in 30 years.

    Log in to Reply
    • Yangyuan Lin says

      November 3, 2021 at 12:09 am

      Hi Oluwaseun,
      I think the formula you use 2^n/2 will tell you the number of key combinations, so 2^128/2 will be a large number of key combinations, and increasing the value by 1 every year makes it significantly more difficult to crack.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in