I have been asked to answer a question regarding cyber policy. The question reads, “How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?” My answer is quite simple, we should continue to develop and innovate cyber technologies that piggyback off our development of processing power in today’s central processing units. Given the truth of Moore’s Law, that processing power doubles about every two years, it is strange that our technologies do not take advantage of our current efficient processing capabilities. Knowing this knowledge, we should be developing encryption algorithms that are “high intensity” in processing. These algorithms would benefit greatly with from today’s CPU’s. The current encryption standard, AES-128 bit, it was developed back in 2002. That was 18 years ago. Processing power has doubled around 9 times since its conception. Fortunately, systems that do process a lot of data are taking full advantage of our current processing capabilities. With infrastructure, it is important that we build off of the technologies that came before it. For example, modems and routers. These pieces of technologies used to be two separate devices. However, in recent years, they have been consolidated into one single device. This has made networks more efficient and administrating these networks, have become easier, along with ensuring that they remain secure. As for policy, the same as infrastructure. Specifically, organizations that produce standards, such as NIST, should be reevaluating the current standards to accommodate the projections of the future. Going back to the current encryption standard example, perhaps the bit count for AES-128-bit encryption should be increased to a 256-bit count. Another thing to consider is the rapid development of new technologies. Organizations like NIST, should be amending current standards to incorporate the risks and rewards of new technologies that are emerging.
Leave a Reply