Length is the secret for code security

At the heart of modern data encryption systems are sophisticated cryptographic keys. Based on complex mathematical algorithms, the keys enable information to be encoded by senders before transmission. Only a person in possession of the correct key can then decode the message and read its contents.

The strength of a key is determined by its length, expressed in bits. The longer a key, the more secure messages encrypted with it will be. For example, an 8-bit key has 256 possible combinations, or ways in which to encrypt a message. Without the correct key, a recipient would have to check all 256 combinations to determine which one had been used. While this is possible with short keys, the number of combinations rises exponentially with the number of bits in the key, thus making the job extremely difficult.

Many software products on the market use 40- or 56-bit keys, while 128- bit and longer permutations are becoming common. These keys are virtually impossible to crack using brute computational force, because of the huge number of potential combinations.

There are two basic types of key cryptography: secret and public. The secret key method, the oldest and simplest, relies on both the sender and receiver possessing the same key. A sender simply encrypts and sends the message. Anyone else reading the transmission will see nothing but garbled text. The recipient decodes the message using the same key. This system works well, but becomes complex if one person wishes to communicate securely with a large number of people, as a different key has to be used for each person.

Public key cryptography is more complex, but offers a greater degree of flexibility. It works by using pairs of keys. One key is kept secret by the recipient, while the second can be distributed publicly.

A sender uses a recipient's public key to encrypt a message for transmission. Because of the unique mathematical nature of the key pair, the message can be decrypted only by using the recipient's private key. This ensures security while enabling many people to communicate with the recipient.

Some systems being developed for electronic commerce use a combination of both systems. Initial contact is established between two parties - such as a customer and a bank - using a public key system. Once the link is made, secret codes are generated and are then used to encrypt further transmissions. This ensures that valuable information remains secure.

Cryptographic experts around the world are hard at work creating ever more secure keys. Their work forms an integral part of future electronic communication and commerce.

PROMOTED VIDEO
Have you tried new the Independent Digital Edition apps?
Life and Style
ebookNow available in paperback
ebooks
ebookPart of The Independent’s new eBook series The Great Composers
Arts and Entertainment
Kara Tointon and Jeremy Piven star in Mr Selfridge
tvActress Kara Tointon on what to expect from Series 3
Voices
Winston Churchill, then prime minister, outside No 10 in June 1943
voicesA C Benson called him 'a horrid little fellow', George Orwell would have shot him, but what a giant he seems now, says DJ Taylor
News
i100
Sport
footballBrighton vs Arsenal match report
Arts and Entertainment
Benedict Cumberbatch has spoken about the lack of opportunities for black British actors in the UK
film
News
Latest stories from i100
Have you tried new the Independent Digital Edition apps?
Independent Dating
and  

By clicking 'Search' you
are agreeing to our
Terms of Use.

ES Rentals

    iJobs Job Widget
    iJobs General

    Austen Lloyd: Private Client Solicitor - Oxford

    Excellent Salary : Austen Lloyd: OXFORD - REGIONAL FIRM - An excellent opportu...

    Austen Lloyd: Clinical Negligence Associate / Partner - Bristol

    Super Package: Austen Lloyd: BRISTOL - SENIOR CLINICAL NEGLIGENCE - An outstan...

    Recruitment Genius: Sales Consultant - Solar Energy - OTE £50,000

    £15000 - £50000 per annum: Recruitment Genius: Fantastic opportunities are ava...

    Recruitment Genius: Compute Engineer

    Negotiable: Recruitment Genius: A Compute Engineer is required to join a globa...

    Day In a Page

    Syria crisis: Celebrities call on David Cameron to take more refugees as one young mother tells of torture by Assad regime

    Celebrities call on David Cameron to take more Syrian refugees

    One young mother tells of torture by Assad regime
    Iraq invasion 2003: The bloody warnings six wise men gave to Tony Blair as he prepared to launch poorly planned campaign

    What the six wise men told Tony Blair

    Months before the invasion of Iraq in 2003, experts sought to warn the PM about his plans. Here, four of them recall that day
    25 years of The Independent on Sunday: The stories, the writers and the changes over the last quarter of a century

    25 years of The Independent on Sunday

    The stories, the writers and the changes over the last quarter of a century
    Homeless Veterans appeal: 'Really caring is a dangerous emotion in this kind of work'

    Homeless Veterans appeal

    As head of The Soldiers' Charity, Martin Rutledge has to temper compassion with realism. He tells Chris Green how his Army career prepared him
    Wu-Tang Clan and The Sexual Objects offer fans a chance to own the only copies of their latest albums

    Smash hit go under the hammer

    It's nice to pick up a new record once in a while, but the purchasers of two latest releases can go a step further - by buying the only copy
    Geeks who rocked the world: Documentary looks back at origins of the computer-games industry

    The geeks who rocked the world

    A new documentary looks back at origins of the computer-games industry
    Belle & Sebastian interview: Stuart Murdoch reveals how the band is taking a new direction

    Belle & Sebastian is taking a new direction

    Twenty years ago, Belle & Sebastian was a fey indie band from Glasgow. It still is – except today, as prime mover Stuart Murdoch admits, it has a global cult following, from Hollywood to South Korea
    America: Land of the free, home of the political dynasty

    America: Land of the free, home of the political dynasty

    These days in the US things are pretty much stuck where they are, both in politics and society at large, says Rupert Cornwell
    A graphic history of US civil rights – in comic book form

    A graphic history of US civil rights – in comic book form

    A veteran of the Fifties campaigns is inspiring a new generation of activists
    Winston Churchill: the enigma of a British hero

    Winston Churchill: the enigma of a British hero

    A C Benson called him 'a horrid little fellow', George Orwell would have shot him, but what a giant he seems now, says DJ Taylor
    Growing mussels: Precious freshwater shellfish are thriving in a unique green project

    Growing mussels

    Precious freshwater shellfish are thriving in a unique green project
    Diana Krall: The jazz singer on being friends with Elton John, outer space and skiing in Dubai

    Diana Krall interview

    The jazz singer on being friends with Elton John, outer space and skiing in Dubai
    Pinstriped for action: A glimpse of what the very rich man will be wearing this winter

    Pinstriped for action

    A glimpse of what the very rich man will be wearing this winter
    Russell T Davies & Ben Cook: 'Our friendship flourished online. You can share some very revelatory moments at four in the morning…'

    Russell T Davies & Ben Cook: How we met

    'Our friendship flourished online. You can share some very revelatory moments at four in the morning…'
    Bill Granger recipes: Our chef serves up his favourite Japanese dishes

    Bill Granger's Japanese recipes

    Stock up on mirin, soy and miso and you have the makings of everyday Japanese cuisine