# Length is the secret for code security

At the heart of modern data encryption systems are sophisticated cryptographic keys. Based on complex mathematical algorithms, the keys enable information to be encoded by senders before transmission. Only a person in possession of the correct key can then decode the message and read its contents.

The strength of a key is determined by its length, expressed in bits. The longer a key, the more secure messages encrypted with it will be. For example, an 8-bit key has 256 possible combinations, or ways in which to encrypt a message. Without the correct key, a recipient would have to check all 256 combinations to determine which one had been used. While this is possible with short keys, the number of combinations rises exponentially with the number of bits in the key, thus making the job extremely difficult.

Many software products on the market use 40- or 56-bit keys, while 128- bit and longer permutations are becoming common. These keys are virtually impossible to crack using brute computational force, because of the huge number of potential combinations.

There are two basic types of key cryptography: secret and public. The secret key method, the oldest and simplest, relies on both the sender and receiver possessing the same key. A sender simply encrypts and sends the message. Anyone else reading the transmission will see nothing but garbled text. The recipient decodes the message using the same key. This system works well, but becomes complex if one person wishes to communicate securely with a large number of people, as a different key has to be used for each person.

Public key cryptography is more complex, but offers a greater degree of flexibility. It works by using pairs of keys. One key is kept secret by the recipient, while the second can be distributed publicly.

A sender uses a recipient's public key to encrypt a message for transmission. Because of the unique mathematical nature of the key pair, the message can be decrypted only by using the recipient's private key. This ensures security while enabling many people to communicate with the recipient.

Some systems being developed for electronic commerce use a combination of both systems. Initial contact is established between two parties - such as a customer and a bank - using a public key system. Once the link is made, secret codes are generated and are then used to encrypt further transmissions. This ensures that valuable information remains secure.

Cryptographic experts around the world are hard at work creating ever more secure keys. Their work forms an integral part of future electronic communication and commerce.

Suggested Topics
News

people
News

news
Life and Style

health
News

Life and Style

### A History of The Great War in 100 Moments

ebookNow available in paperback
Life and Style

### It's not just your iPhone that's vulnerable to the texting bug

tech
Arts and Entertainment

### San Andreas: A disaster flick with clear fault lines

filmReview: In the face of all-round devastation, even Dwayne 'The Rock' Johnson appears a little puny
News

### Watch Tom Hardy's excellent reaction to a journalist asking about all the women in Mad Max

i100
Arts and Entertainment

books
Sport

### With the Premier League over for another year, here are my awards

footballPaul Scholes on the best players, managers and goals of the season - and the biggest disappointments
News

i100
Life and Style

health
Life and Style

tech
Voices

voices
Life and Style

life + style
News

news

### Dior and I: an artful argument for a new couture

##### Independent Dating
and

By clicking 'Search' you
are agreeing to our

### Recruitment Genius: Web Developer - Junior / Middleweight

Negotiable: Recruitment Genius: One of the South East's fastest growing full s...

### Guru Careers: Marketing Manager / Marketing Communications Manager

£35-40k (DOE) + Benefits: Guru Careers: We are seeking a Marketing Communicati...

### Recruitment Genius: Commercial Engineer

£30000 - £32000 per annum: Recruitment Genius: Estimating, preparation of tech...

### Recruitment Genius: IT Support Technician

£14000 - £17000 per annum: Recruitment Genius: You will work as part of a smal...

## The 161-page dossier that exposes Fifa's dark heart

How did a group of corrupt officials turn football’s governing body into what was, in essence, a criminal enterprise? Chris Green and David Connett reveal all

## Exclusive interview with Tripoli PM Khalifa al-Ghweil

'If Europe thinks bombing boats will stop smuggling, it will not. We will defend ourselves'

## Raymond Chandler's Los Angeles

How the author foretold the Californian water crisis

## Art attack

Chinese artist who posted funny image of President Xi Jinping facing five years in prison

## Cher is the new face of Marc Jacobs

Alexander Fury explains why designers are turning to august stars to front their lines

## 'I'm climbing Ben Nevis for my daughter'

Karen Attwood's young daughter Yasmin beat cancer. Now her family is about to take on a new challenge - scaling Ben Nevis to help other children

## It's that time of year again... 10 best wedding gift ideas

Forget that fancy toaster, we've gone off-list to find memorable gifts that will last a lifetime

## Paul Scholes column

With the Premier League over for another year, here are my end of season awards

## Liverpool have seen too much tragedy to forget Heysel

Thirty years ago, 39 fans waiting to watch a European Cup final died as a result of a fatal cocktail of circumstances. Ian Herbert looks at how a club dealt with this tragedy

## Khan’s audition for Mayweather may turn into a no-win situation

The Bolton fighter could be damned if he dazzles and damned if he doesn’t against Algieri, the man last seen being decked six times by Pacquiao, says Frank Warren

## Blundering Blair quits as Middle East peace envoy – only Israel will miss him

For Arabs – and for Britons who lost their loved ones in his shambolic war in Iraq – his appointment was an insult, says Robert Fisk

## Fifa corruption arrests

All hail the Feds for riding to football's rescue, says Ian Herbert

## The Kurdish enclave still resisting the tyranny of Assad and Isis

In Syrian Kurdish cantons along the Turkish border, the progressive aims of the 2011 uprising are being enacted despite the war. Patrick Cockburn returns to Amuda

## How I survived Cambodia's Killing Fields

Acclaimed surgeon SreyRam Kuy celebrates her mother's determination to escape to the US

## How Stephen Mangan got his range

Posh buffoon, hapless writer, pregnant dad - Mangan is certainly a versatile actor