Length is the secret for code security
Tuesday 27 May 1997
The strength of a key is determined by its length, expressed in bits. The longer a key, the more secure messages encrypted with it will be. For example, an 8-bit key has 256 possible combinations, or ways in which to encrypt a message. Without the correct key, a recipient would have to check all 256 combinations to determine which one had been used. While this is possible with short keys, the number of combinations rises exponentially with the number of bits in the key, thus making the job extremely difficult.
Many software products on the market use 40- or 56-bit keys, while 128- bit and longer permutations are becoming common. These keys are virtually impossible to crack using brute computational force, because of the huge number of potential combinations.
There are two basic types of key cryptography: secret and public. The secret key method, the oldest and simplest, relies on both the sender and receiver possessing the same key. A sender simply encrypts and sends the message. Anyone else reading the transmission will see nothing but garbled text. The recipient decodes the message using the same key. This system works well, but becomes complex if one person wishes to communicate securely with a large number of people, as a different key has to be used for each person.
Public key cryptography is more complex, but offers a greater degree of flexibility. It works by using pairs of keys. One key is kept secret by the recipient, while the second can be distributed publicly.
A sender uses a recipient's public key to encrypt a message for transmission. Because of the unique mathematical nature of the key pair, the message can be decrypted only by using the recipient's private key. This ensures security while enabling many people to communicate with the recipient.
Some systems being developed for electronic commerce use a combination of both systems. Initial contact is established between two parties - such as a customer and a bank - using a public key system. Once the link is made, secret codes are generated and are then used to encrypt further transmissions. This ensures that valuable information remains secure.
Cryptographic experts around the world are hard at work creating ever more secure keys. Their work forms an integral part of future electronic communication and commerce.
Life & Style blogs
Kylie Jenner challenge: Bizarre lip suction device inspired by Kardashian sister goes viral
Chloe Sevigny poses with a lobster on her crotch in a daring shoot for Marfa Journal
Loch Ness Monster: Google Maps unveils Nessie Street View and homepage Doodle to mark 81st anniversary of iconic photograph
Coachella Festival 2015: from Kendall Jenner to Alexa Chung, stars and festival-goers parade their boho best
What do the emoji on Snapchat mean?
If I’m being racially abused I don’t need a stranger with a saviour complex to rescue me
The only black face in the Ukip manifesto is on the page about overseas aid
Ukip is the only main political party to not address LGBT rights in its manifesto
Food banks: One million Britons will soon be using them, according to Trussell Trust
Religion isn't growing, it is becoming vigorous in its demise, says philosopher AC Grayling
BBC election debate: The one photo that summed up the whole 90-minute leaders debate
- 1 Rarest Beanie Baby bought for just £10 at car boot sale could be sold for £62,500 on eBay
- 2 Katie Hopkins and The Sun editor are reported to police for incitement to racial hatred following migrant boat column
- 3 Katie Hopkins has just written a piece so hateful that it might give Hitler pause – why was it published?
- 4 Australian student Tommy Connolly, 23, adopts his pregnant, homeless 17-year-old cousin to give her a chance at 'a better life'
- 5 Cancel Sky at your peril: man spends 96 minutes in chat but fails to get rid of service
£14000 - £18000 per annum: Recruitment Genius: An Office Administrator is requ...
£12000 - £40000 per annum: Recruitment Genius: Due to expansion and growth of ...
£40000 - £50000 per annum: Ashdown Group: Senior PHP Developer position with a...
Negotiable: Recruitment Genius: An Operations Leader is required to join a lea...