Skip to main content
. 2024 Oct 15;24(20):6631. doi: 10.3390/s24206631

Table 1.

Size of the keys and effective computation required by the brute-force attack.

Size of k
(bits)
Total Key Size
(E1(·) + E2(·))
Effective Computation Required
(birthday Paradox)
Plain LPSec 256 300 2150
Keys from QKD 8602 8646 24,322
Keys from QRNG 4,194,304 4,194,348 22,097,174