• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 1

November 2, 2023 by David Lanter 24 Comments

The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year.  Today a symmetric session key needs to be 100 bits long to be considered strong.  How long will a symmetric session key have to be in 30 years to be considered strong? (Hint: Consider how much longer decryption takes if the key length is increased by a single bit.) Explain.

Filed Under: Unit 11: Cryptography, Public Key Encryption and Digital Signature Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    November 3, 2023 at 10:53 pm

    The strength of a symmetric session key is directly related to the time it would take an attacker to perform a brute-force search of all possible key combinations hence, the longer the key, the more possible combinations an attacker needs to try, making the key stronger.

    Assuming that the processing speed of microprocessors is doubling every year, it means that the computing power available to an attacker is also doubling each year. In this scenario, we can calculate how long a symmetric session key should be in 30 years to maintain its strength.

    The current key length is 100 bits, maintaining the same level of security in 30 years, an attacker’s computing power would double 30 times over.

    Calculating the required key length:

    Required key length = current key length + (doubling rate * years)
    100 bits + (1 bit per year * 30)
    100 + 30 = 130 bits

    In 30 years, the symmetric session key would need to be 130 bits long to maintain the same level of security offered by a 100-bit key today. As the attacker’s computing power has doubled 30 times, a longer key is required to ensure that the time required to perform a brute-force attack remains sufficient and long enough to maintain its strength.

    Log in to Reply
    • Eyup Aslanbay says

      November 6, 2023 at 1:55 pm

      It’s a clear and concise explanation that highlights the importance of staying ahead in the cybersecurity arms race. The projection of key length requirements over the next 30 years is particularly insightful, offering a tangible roadmap for maintaining data security in the face of rapidly evolving technology.

      Log in to Reply
    • Celinemary Turner says

      November 6, 2023 at 9:28 pm

      Hi Ooreofeoluwa,
      You have done an excellent job of breaking down a complex issue into a clear and understandable concept. Calculation provided to determine the required key length in 30 years is straightforward and well-justified.

      Log in to Reply
  2. Yannick Rugamba says

    November 4, 2023 at 7:31 pm

    The effectiveness of a session key is directly linked to its bit length as each additional bit doubles the number of keys. With microprocessor speeds doubling every year the computational ability to attempt brute force decryption grows exponentially. After 30 years this ability will have grown by a factor of 230 To maintain protection, against such advancements the length of a symmetric key must also increase to provide an equivalent level of security.

    Presently a 100-bit key is secure. To counterbalance the 30 increases in processing power over the next 30 years it is necessary to add an additional 30 bits to the key length resulting in a 130-bit key. This ensures that the time required for brute forcing the key remains consistent with today’s standards regardless of advancements, in processing speed.

    Log in to Reply
    • Celinemary Turner says

      November 6, 2023 at 9:21 pm

      Hi Yannick,
      Indeed you make a useful and straightforward perspective on key length and its relation to security against the backdrop of increasing processing power. It’s essential to remember that the field of cryptography is continually evolving, and security measures should be regularly reviewed and updated to adapt to changing threats and advancements in technology.

      Log in to Reply
    • Ooreofeoluwa Koyejo says

      November 7, 2023 at 11:10 am

      This is an apt and straightforward description towards the answer and the considerations towards it.

      Log in to Reply
  3. Nicholas Nirenberg says

    November 4, 2023 at 10:42 pm

    If adding one bit to the key length roughly doubles the computation time, and considering the total processing speed of microprocessors is doubling roughly every year, in 30 years, the computational power available to attackers will have increased by 2^30. To counteract this increased computational power and maintain the same level of security, the symmetric session key length would need to be increased by 30 bits. This is because adding one bit at a time would require doubling the computation time 30 times to match the increased computational power of attackers over the 30-year period. So, in 30 years, a symmetric session key would need to be 130 bits long to be considered strong, assuming adding one bit doubles the computation time and considering the exponential growth in computational power.

    Log in to Reply
    • Celinemary Turner says

      November 6, 2023 at 9:16 pm

      Hi Nicholas,
      You makes a reasonable attempt to address the relationship between computational power and symmetric session key length in the context of maintaining security.

      Log in to Reply
  4. Edge Kroll says

    November 5, 2023 at 5:07 pm

    As processing speeds increase so does the effectiveness of brute force attacks. The question states power is doubling each year, and that 100 bits currently proves to be an effective strength. This means that in order to account for the added processing power 1 bit must be added each year in order to ensure security. Therefore in 30 years 130 bits will be required in order to be considered strong aand secure.

    Log in to Reply
    • Nicholas Nirenberg says

      November 6, 2023 at 12:17 pm

      Hi Edge, I agree. Increasing processing speeds heighten the effectiveness of brute force attacks. Adding 1 bit annually to the current 100 bits is essential to adapt to this growth, ensuring security. In 30 years, 130 bits will be vital for maintaining strong encryption against evolving computational capabilities.

      Log in to Reply
    • Ooreofeoluwa Koyejo says

      November 7, 2023 at 11:13 am

      Knowing the factors and risks involved in the length of keys would be input to determine the minimum required length in 30 years.

      Log in to Reply
  5. Celinemary Turner says

    November 5, 2023 at 6:19 pm

    A symmetric session key is a cryptographic key used in symmetric encryption; the strength of a symmetric session key is measured in bits, representing the level of security provided by that key in protecting data. In symmetric cryptography, the strength of a session key depends on its length. The longer the key, the stronger the encryption and the more resistant it is to brute-force attacks.
    The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Currently, a symmetric session key needs to be 100 bits long to be considered strong.
    In this case, to determine how long will a symmetric session key have to be in 30 years to be considered strong.
    One bit must be added each year since a single bit increase doubles the number of possible keys.

    Therefore, Calculating the required key length:
    Required key length = current key length + (doubling rate * years)
    100 bits + (1 bit per year * 30)
    100 + 30 = 130 bits
    A symmetric session key must be 130 bits long in 30 years to be considered strong. For 30 years, a bit should be added each year; thus, it makes to be 130 bits.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      November 7, 2023 at 11:14 am

      Welldone Celine, this is a good breakdown to determine the answer for the key length in 30 years.

      Log in to Reply
    • Bo Wang says

      November 7, 2023 at 8:31 pm

      I like that you show the key length calculation very accurately and clearly.

      Log in to Reply
  6. Bo Wang says

    November 5, 2023 at 8:17 pm

    In 30 years, a symmetric session key should be at least 130 bits long to be considered strong, assuming Moore’s Law continues to double the processing speed of microprocessors every year. This increase in key length compensates for the increased computational power of future microprocessors and maintains a similar level of security as a 100-bit key today.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      November 7, 2023 at 11:15 am

      Nice perspective brings Moore’s law into the response to this.

      Log in to Reply
    • Hashem Alsharif says

      November 7, 2023 at 11:14 pm

      Hey Bo, you did a great job explaining why it would be 130 bits long to be considered strong. While we may know the number that is necessary for a key today, it’s always best to anticipate for the future, which you did in your explanation. does this mean 50 years from now the key would have to be 150 bits long?

      Log in to Reply
  7. Jon Stillwagon says

    November 5, 2023 at 9:01 pm

    A symmetric cipher consists of an algorithm and a key so to use that cipher it needs to be encrypted and then decrypted when sent to someone. The cipher will use the same algorithm and key to decrypt the encryption but the current symmetric session key has to be 100 bits long. The symmetric session key length would be 30 years from now even though the total processing speed of microprocessors doubles every year. It would have to be 130 bits because if the bit length is increased by a single bit every year that would lead the symmetric session key length to be 130 bits long when the 30-year mark hits.

    Log in to Reply
    • Edge Kroll says

      November 7, 2023 at 5:41 pm

      Hi Jon,

      This is an excellent way to describe it. I believe it is also important to remember that this adjustment is influenced by many factors such as advances in cryptography, security requirements, and emerging threats, not solely by the doubling of microprocessor processing speed.

      Log in to Reply
  8. Eyup Aslanbay says

    November 5, 2023 at 9:24 pm

    If the processing speed doubles every year, in 30 years it will have doubled 30 times. If we consider that increasing the key length by one bit theoretically doubles the amount of time it takes to brute-force the key, then we need to increase the key length by one bit for every time the processing speed doubles to maintain the same level of security. So, if the processing power doubles 30 times, we would need to add 30 bits to the original 100-bit key length to maintain a similar level of security, resulting in a 130-bit key.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      November 7, 2023 at 11:17 am

      Simple thought process to derive the answer for the expected key length in 30 years.

      Log in to Reply
  9. Hashem Alsharif says

    November 5, 2023 at 11:52 pm

    When taking into consideration the processing speed of microprocessors doubling each year, and currently a session key has to be 100 bits long for it to be strong, we can use this information to calculate how long a session key must be 30 years from now. by adding 1 bit for each year, it allows the session key to maintain it’s strength in the future, when computers are more advanced, which would be 130 bits.

    Log in to Reply
    • Jon Stillwagon says

      November 7, 2023 at 2:50 pm

      Hashem, it can keep organizations equipment balanced and not have to replace their technology due to failures or breakdowns. It will also keep the information protected for the organization when conducting business.

      Log in to Reply
    • Yannick Rugamba says

      November 7, 2023 at 7:50 pm

      Hi Hashem,
      Your estimate, about a 130 bit key becoming feasible within the three decades is accurate. However, it’s crucial to clarify that the growth of computing power follows a trajectory than a linear one. Each bit in a key double the difficulty of decryption making it more intricate than increasing the key size by one bit each year. Moreover, the strength of encryption is influenced by factors than just the length of the encryption key, such, as the specific algorithm employed.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in