Length is the secret for code security
Tuesday 27 May 1997
The strength of a key is determined by its length, expressed in bits. The longer a key, the more secure messages encrypted with it will be. For example, an 8-bit key has 256 possible combinations, or ways in which to encrypt a message. Without the correct key, a recipient would have to check all 256 combinations to determine which one had been used. While this is possible with short keys, the number of combinations rises exponentially with the number of bits in the key, thus making the job extremely difficult.
Many software products on the market use 40- or 56-bit keys, while 128- bit and longer permutations are becoming common. These keys are virtually impossible to crack using brute computational force, because of the huge number of potential combinations.
There are two basic types of key cryptography: secret and public. The secret key method, the oldest and simplest, relies on both the sender and receiver possessing the same key. A sender simply encrypts and sends the message. Anyone else reading the transmission will see nothing but garbled text. The recipient decodes the message using the same key. This system works well, but becomes complex if one person wishes to communicate securely with a large number of people, as a different key has to be used for each person.
Public key cryptography is more complex, but offers a greater degree of flexibility. It works by using pairs of keys. One key is kept secret by the recipient, while the second can be distributed publicly.
A sender uses a recipient's public key to encrypt a message for transmission. Because of the unique mathematical nature of the key pair, the message can be decrypted only by using the recipient's private key. This ensures security while enabling many people to communicate with the recipient.
Some systems being developed for electronic commerce use a combination of both systems. Initial contact is established between two parties - such as a customer and a bank - using a public key system. Once the link is made, secret codes are generated and are then used to encrypt further transmissions. This ensures that valuable information remains secure.
Cryptographic experts around the world are hard at work creating ever more secure keys. Their work forms an integral part of future electronic communication and commerce.
Life & Style blogs
Bombsheller: The website that makes us all into top fashion designers
Husband creates spreadsheet detailing wife's 'excuses' for turning down sex
The 10 Best Scotch Whiskies
Standing my ground: If sitting is bad for your health, what happens when you stay on your feet for a whole month?
The 10 Best kitchen knives
Israel-Gaza conflict: The secret report that helps Israelis to hide facts
A day in the life of Vladimir Putin: The dictator in his labyrinth
Opponents of Israel's military operation in Gaza are the real enemies of Middle Eastern peace
Were 'Poor Doors' added to mixed developments so wealthy residents don't have to go in alongside social housing tenants?
Arizona execution lasts two hours as killer Joseph Wood left 'snorting and gasping' for air
Malaysia Airlines MH17 crash: Massive rise in sale of British arms to Russia
- 1 Christians: The world's most persecuted people
- 2 Israel-Gaza conflict: The secret report that helps Israelis to hide facts
- 3 Thatcher ‘was warned of Tory child sex party claims’
- 4 Lauren Goodger sex tape: Reality star calls for tougher laws on revenge porn after intimate video leaks online
- 5 The Simpsons Family Guy trailer: First look at crossover episode after Comic-Con debut
£30000 - £50000 per annum: Harrington Starr: PHP / MySQL Developer (PHP, MySQL...
£30000 - £45000 per annum: Harrington Starr: C# Back-End Developer (C#, .NET, ...
£30000 - £40000 per annum: Harrington Starr: Web Developer (C#, HTML5, CSS3, J...
£30000 - £50000 per annum: Harrington Starr: C# Software Developer (C#, front-...