Length is the secret for code security

At the heart of modern data encryption systems are sophisticated cryptographic keys. Based on complex mathematical algorithms, the keys enable information to be encoded by senders before transmission. Only a person in possession of the correct key can then decode the message and read its contents.

The strength of a key is determined by its length, expressed in bits. The longer a key, the more secure messages encrypted with it will be. For example, an 8-bit key has 256 possible combinations, or ways in which to encrypt a message. Without the correct key, a recipient would have to check all 256 combinations to determine which one had been used. While this is possible with short keys, the number of combinations rises exponentially with the number of bits in the key, thus making the job extremely difficult.

Many software products on the market use 40- or 56-bit keys, while 128- bit and longer permutations are becoming common. These keys are virtually impossible to crack using brute computational force, because of the huge number of potential combinations.

There are two basic types of key cryptography: secret and public. The secret key method, the oldest and simplest, relies on both the sender and receiver possessing the same key. A sender simply encrypts and sends the message. Anyone else reading the transmission will see nothing but garbled text. The recipient decodes the message using the same key. This system works well, but becomes complex if one person wishes to communicate securely with a large number of people, as a different key has to be used for each person.

Public key cryptography is more complex, but offers a greater degree of flexibility. It works by using pairs of keys. One key is kept secret by the recipient, while the second can be distributed publicly.

A sender uses a recipient's public key to encrypt a message for transmission. Because of the unique mathematical nature of the key pair, the message can be decrypted only by using the recipient's private key. This ensures security while enabling many people to communicate with the recipient.

Some systems being developed for electronic commerce use a combination of both systems. Initial contact is established between two parties - such as a customer and a bank - using a public key system. Once the link is made, secret codes are generated and are then used to encrypt further transmissions. This ensures that valuable information remains secure.

Cryptographic experts around the world are hard at work creating ever more secure keys. Their work forms an integral part of future electronic communication and commerce.

Have you tried new the Independent Digital Edition apps?
Life and Style
ebookNow available in paperback
ebooks
ebookA delicious collection of 50 meaty main courses
Latest stories from i100
Have you tried new the Independent Digital Edition apps?
Independent Dating
and  

By clicking 'Search' you
are agreeing to our
Terms of Use.

ES Rentals

    iJobs Job Widget
    iJobs General

    Recruitment Genius: Business Analyst - 12 Month FTC - Entry Level

    £23000 - £27000 per annum: Recruitment Genius: A Business Analyst is required ...

    Recruitment Genius: Chefs - All Levels

    £16000 - £23000 per annum: Recruitment Genius: To succeed, you will need to ha...

    Recruitment Genius: Maintenance Engineer

    £8 per hour: Recruitment Genius: This is an opportunity to join an award winni...

    Recruitment Genius: Telesales Executive & Customer Service - Call Centre Jobs!

    £7 - £9 per hour: Recruitment Genius: Are you outgoing? Do you want to work in...

    Day In a Page

    Isis in Syria: Influential tribal leaders hold secret talks with Western powers and Gulf states over possibility of mobilising against militants

    Tribal gathering

    Influential clans in Syria have held secret talks with Western powers and Gulf states over the possibility of mobilising against Isis. But they are determined not to be pitted against each other
    Gaza, a year on from Operation Protective Edge: A growing population and a compromised and depleted aquifer leaves water in scarce supply for Palestinians

    Gaza, a year on from Operation Protective Edge

    A growing population and a compromised and depleted aquifer leaves water in scarce supply for Palestinians
    Dozens of politicians, bureaucrats and businessmen linked to Indian bribery scandal die mysteriously

    Illnesses, car crashes and suicides

    Dozens of politicians, bureaucrats and businessmen linked to Indian bribery scandal die mysteriously
    Srebrenica 20 years after the genocide: Why the survivors need closure

    Bosnia's genocide, 20 years on

    No-one is admitting where the bodies are buried - literally and metaphorically
    How Comic-Con can make or break a movie: From Batman vs Superman to Star Wars: Episode VII

    Power of the geek Gods

    Each year at Comic-Con in San Diego, Hollywood bosses nervously present blockbusters to the hallowed crowd. It can make or break a movie
    What do strawberries and cream have to do with tennis?

    Perfect match

    What do strawberries and cream have to do with tennis?
    10 best trays

    Get carried away with 10 best trays

    Serve with ceremony on a tray chic carrier
    Wimbledon 2015: Team Murray firing on all cylinders for SW19 title assault

    Team Murray firing on all cylinders for title assault

    Coaches Amélie Mauresmo and Jonas Bjorkman aiming to make Scot Wimbledon champion again
    Wimbledon 2015: Nick Bollettieri - Vasek Pospisil must ignore tiredness and tell himself: I'm in the quarter-final, baby!

    Nick Bollettieri's Wimbledon Files

    Vasek Pospisil must ignore tiredness and tell himself: I'm in the quarter-final, baby!
    Ashes 2015: Angus Fraser's top 10 moments from previous series'

    Angus Fraser's top 10 Ashes moments

    He played in five series against Australia and covered more as a newspaper correspondent. From Waugh to Warne and Hick to Headley, here are his highlights
    Greece debt crisis: EU 'family' needs to forgive rather than punish an impoverished state

    EU 'family' needs to forgive rather than punish an impoverished state

    An outbreak of malaria in Greece four years ago helps us understand the crisis, says Robert Fisk
    Gaza, a year on from Operation Protective Edge: The traumatised kibbutz on Israel's front line, still recovering from last summer's war with Hamas

    Gaza, a year on from Operation Protective Edge

    The traumatised kibbutz on Israel's front line, still recovering from last summer's war with Hamas
    How to survive electrical storms: What are the chances of being hit by lightning?

    Heavy weather

    What are the chances of being hit by lightning?
    World Bodypainting Festival 2015: Bizarre and brilliant photos celebrate 'the body as art'

    World Bodypainting Festival 2015

    Bizarre and brilliant photos celebrate 'the body as art'
    alt-j: A private jet, a Mercury Prize and Latitude headliners

    Don't call us nerds

    Craig Mclean meets alt-j - the math-folk act who are flying high