Length is the secret for code security

At the heart of modern data encryption systems are sophisticated cryptographic keys. Based on complex mathematical algorithms, the keys enable information to be encoded by senders before transmission. Only a person in possession of the correct key can then decode the message and read its contents.

The strength of a key is determined by its length, expressed in bits. The longer a key, the more secure messages encrypted with it will be. For example, an 8-bit key has 256 possible combinations, or ways in which to encrypt a message. Without the correct key, a recipient would have to check all 256 combinations to determine which one had been used. While this is possible with short keys, the number of combinations rises exponentially with the number of bits in the key, thus making the job extremely difficult.

Many software products on the market use 40- or 56-bit keys, while 128- bit and longer permutations are becoming common. These keys are virtually impossible to crack using brute computational force, because of the huge number of potential combinations.

There are two basic types of key cryptography: secret and public. The secret key method, the oldest and simplest, relies on both the sender and receiver possessing the same key. A sender simply encrypts and sends the message. Anyone else reading the transmission will see nothing but garbled text. The recipient decodes the message using the same key. This system works well, but becomes complex if one person wishes to communicate securely with a large number of people, as a different key has to be used for each person.

Public key cryptography is more complex, but offers a greater degree of flexibility. It works by using pairs of keys. One key is kept secret by the recipient, while the second can be distributed publicly.

A sender uses a recipient's public key to encrypt a message for transmission. Because of the unique mathematical nature of the key pair, the message can be decrypted only by using the recipient's private key. This ensures security while enabling many people to communicate with the recipient.

Some systems being developed for electronic commerce use a combination of both systems. Initial contact is established between two parties - such as a customer and a bank - using a public key system. Once the link is made, secret codes are generated and are then used to encrypt further transmissions. This ensures that valuable information remains secure.

Cryptographic experts around the world are hard at work creating ever more secure keys. Their work forms an integral part of future electronic communication and commerce.

Have you tried new the Independent Digital Edition apps?
Life and Style
ebookNow available in paperback
ebooks
ebookPart of The Independent’s new eBook series The Great Composers
  • Get to the point
Latest stories from i100
Have you tried new the Independent Digital Edition apps?
Independent Dating
and  

By clicking 'Search' you
are agreeing to our
Terms of Use.

ES Rentals

    iJobs Job Widget
    iJobs General

    Ashdown Group: Practice Accountant - Bournemouth - £38,000

    £32000 - £38000 per annum: Ashdown Group: A successful accountancy practice in...

    SThree: Trainee Recruitment Consultant

    £18000 - £23000 per annum + Uncapped commission: SThree: Does earning a 6 figu...

    Recruitment Genius: SEO Executive

    £18000 - £25000 per annum: Recruitment Genius: This is an exciting opportunity...

    Recruitment Genius: New Lift Sales Executive - Lift and Elevators

    £35000 - £40000 per annum: Recruitment Genius: A challenging opportunity for a...

    Day In a Page

    The saffron censorship that governs India: Why national pride and religious sentiment trump freedom of expression

    The saffron censorship that governs India

    Zareer Masani reveals why national pride and religious sentiment trump freedom of expression
    Prince Charles' 'black spider' letters to be published 'within weeks'

    Prince Charles' 'black spider' letters to be published 'within weeks'

    Supreme Court rules Dominic Grieve's ministerial veto was invalid
    Distressed Zayn Malik fans are cutting themselves - how did fandom get so dark?

    How did fandom get so dark?

    Grief over Zayn Malik's exit from One Direction seemed amusing until stories of mass 'cutting' emerged. Experts tell Gillian Orr the distress is real, and the girls need support
    The galaxy collisions that shed light on unseen parallel Universe

    The cosmic collisions that have shed light on unseen parallel Universe

    Dark matter study gives scientists insight into mystery of space
    The Swedes are adding a gender-neutral pronoun to their dictionary

    Swedes introduce gender-neutral pronoun

    Why, asks Simon Usborne, must English still struggle awkwardly with the likes of 's/he' and 'they'?
    Disney's mega money-making formula: 'Human' remakes of cartoon classics are part of a lucrative, long-term creative plan

    Disney's mega money-making formula

    'Human' remakes of cartoon classics are part of a lucrative, long-term creative plan
    Lobster has gone mainstream with supermarket bargains for £10 or less - but is it any good?

    Lobster has gone mainstream

    Anthea Gerrie, raised on meaty specimens from the waters around Maine, reveals how to cook up an affordable feast
    Easter 2015: 14 best decorations

    14 best Easter decorations

    Get into the Easter spirit with our pick of accessories, ornaments and tableware
    Paul Scholes column: Gareth Bale would be a perfect fit at Manchester United and could turn them into serious title contenders next season

    Paul Scholes column

    Gareth Bale would be a perfect fit at Manchester United and could turn them into serious title contenders next season
    Inside the Kansas greenhouses where Monsanto is 'playing God' with the future of the planet

    The future of GM

    The greenhouses where Monsanto 'plays God' with the future of the planet
    Britain's mild winters could be numbered: why global warming is leaving UK chillier

    Britain's mild winters could be numbered

    Gulf Stream is slowing down faster than ever, scientists say
    Government gives £250,000 to Independent appeal

    Government gives £250,000 to Independent appeal

    Donation brings total raised by Homeless Veterans campaign to at least £1.25m
    Oh dear, the most borrowed book at Bank of England library doesn't inspire confidence

    The most borrowed book at Bank of England library? Oh dear

    The book's fifth edition is used for Edexcel exams
    Cowslips vs honeysuckle: The hunt for the UK’s favourite wildflower

    Cowslips vs honeysuckle

    It's the hunt for UK’s favourite wildflower
    Child abuse scandal: Did a botched blackmail attempt by South African intelligence help Cyril Smith escape justice?

    Did a botched blackmail attempt help Cyril Smith escape justice?

    A fresh twist reveals the Liberal MP was targeted by the notorious South African intelligence agency Boss