The Official (ISC)2 SSCP CBK Reference by Wills Mike;
Author:Wills, Mike; [Wills, Michael S.]
Language: eng
Format: epub
Publisher: John Wiley & Sons, Incorporated
Published: 2022-04-12T00:00:00+00:00
Key Strength
Cryptographic key strength was introduced in the first section of this chapter as being strongly related to the number of bits in the encryption key used by a given encryption algorithm. This bit depth actually defines the size of the search space that a brute-force attack would have to go through, checking each possible value, until it found one that matched the hash value or ciphertext being attacked. Such brute-force attacks can, of course, get lucky and strike a match on one of the first few attemptsâ¦or have to run almost forever until a winner turns up. Computer scientists refer to this as a halting problem, in that while you know the maximum number of iterations the search loop must perform, you have no way of knowing whether it will take one iteration, a handful, or a full 2n times around the loop for an n-bit key. This search space size was the first practical way to estimate the work factor associated with cracking a particular cipher. Cryptanalysts could then estimate the number of CPU (or GPU) instruction cycles needed for each iteration, translate that into seconds (or microseconds), and then multiply to estimate the length of how long one's secrets might remain safe from an attacker in terms of hours, days, or weeks.
The search space argument regarding cryptographic strength started to fall apart as the cost of high-performance graphic processing units (GPUs) fell while their processing power soared. (Think about how many complex vector calculations have to be done each second to take a streaming HD video, uncompress it, render it into clusters of pixels of the right color and intensity, provide those pixels to the video driver circuits, and then send the information out to the display. One frame of video is about 6.221 MB of data; at 60 frames per second, one second of video involves about 374 MB of data total, all the result of parallel processing streams inside the GPU.) Software systems for designing massively parallel task streams, dispatching workloads to processors, and coordinating their efforts to produce a finished result have become far more commonplace and more powerful; the hypervisor contained in most modern desktop or laptop computers has many of these capabilities built right in. These factors all compound together to give cryptanalystsâhostile and friendly alikeâentirely new and affordable ways to bring thousands or tens of thousands of CPUs (and GPUs) to a code-breaking task. Attempts have been made by cryptanalysts to express cryptographic strength in âMIP-years,â that is, the number of millions of instructions per second a CPU executes, across a whole year, but this has proven challenging to translate across dissimilar architectures of GPUs, CPUs, and such.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
In-Memory Analytics with Apache Arrow by Matthew Topol(2701)
PostgreSQL 14 Administration Cookbook by Simon Riggs(2227)
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(1797)
Architects of Intelligence_The Truth About AI From the People Building It by Martin Ford(1248)
In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data by Matthew Topol(1046)
Mastering Azure Virtual Desktop: The Ultimate Guide to the Implementation and Management of Azure Virtual Desktop by Ryan Mangan(1029)
Automated Machine Learning in Action by Qingquan Song Haifeng Jin Xia Hu(911)
Python GUI Programming with Tkinter, 2nd edition by Alan D. Moore(882)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(752)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(749)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(430)
Introduction to Algorithms, Fourth Edition by unknow(388)
ABAP Development for SAP HANA by Unknown(368)
Automated Machine Learning in Action by Qingquan Song & Haifeng Jin & Xia Hu(311)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | Rom Adams | Chen Xi(292)
The AWK Programming Language by Aho Alfred V. Kernighan Brian W. Weinberger Peter J. & Brian W. Kernighan & Peter J. Weinberger(283)
Asynchronous Programming in Rust by Carl Fredrik Samson;(272)
Learn Enough Developer Tools to Be Dangerous: Git Version Control, Command Line, and Text Editors Essentials by Michael Hartl(261)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(259)
