thedvnc.org/newsblog/2014/6/9/aes-256-exponentially-easier-to-brute-force...

How has encryption key strength been scaling with increases in the availability of computational capacity? As we discussed last time, the old school of thought extrapolated computational power for a single computer system or single operational thread to compute the time required for a particular calculation. In today’s world, individual user’s don’t just have access to faster PCs, they have smartphones, tablets, gaming consoles and cloud compute services that can crunch exponentially greater numbers than what was once a single device. How have usage paradigms changed the calculation of key strength in the past decade?


Comments (0)

Sign in to post comments.