Length is the secret for code security

At the heart of modern data encryption systems are sophisticated cryptographic keys. Based on complex mathematical algorithms, the keys enable information to be encoded by senders before transmission. Only a person in possession of the correct key can then decode the message and read its contents.

The strength of a key is determined by its length, expressed in bits. The longer a key, the more secure messages encrypted with it will be. For example, an 8-bit key has 256 possible combinations, or ways in which to encrypt a message. Without the correct key, a recipient would have to check all 256 combinations to determine which one had been used. While this is possible with short keys, the number of combinations rises exponentially with the number of bits in the key, thus making the job extremely difficult.

Many software products on the market use 40- or 56-bit keys, while 128- bit and longer permutations are becoming common. These keys are virtually impossible to crack using brute computational force, because of the huge number of potential combinations.

There are two basic types of key cryptography: secret and public. The secret key method, the oldest and simplest, relies on both the sender and receiver possessing the same key. A sender simply encrypts and sends the message. Anyone else reading the transmission will see nothing but garbled text. The recipient decodes the message using the same key. This system works well, but becomes complex if one person wishes to communicate securely with a large number of people, as a different key has to be used for each person.

Public key cryptography is more complex, but offers a greater degree of flexibility. It works by using pairs of keys. One key is kept secret by the recipient, while the second can be distributed publicly.

A sender uses a recipient's public key to encrypt a message for transmission. Because of the unique mathematical nature of the key pair, the message can be decrypted only by using the recipient's private key. This ensures security while enabling many people to communicate with the recipient.

Some systems being developed for electronic commerce use a combination of both systems. Initial contact is established between two parties - such as a customer and a bank - using a public key system. Once the link is made, secret codes are generated and are then used to encrypt further transmissions. This ensures that valuable information remains secure.

Cryptographic experts around the world are hard at work creating ever more secure keys. Their work forms an integral part of future electronic communication and commerce.

Arts and Entertainment
filmPoldark production team claims innocence of viewers' ab frenzy
Life and Style
Google marks the 81st anniversary of the Loch Ness Monster's most famous photograph
techIt's the 81st anniversary of THAT iconic photograph
News
Katie Hopkins makes a living out of courting controversy
people
News
General Election
Have you tried new the Independent Digital Edition apps?
Life and Style
ebookNow available in paperback
ebooks
ebookPart of The Independent’s new eBook series The Great Composers
  • Get to the point
Latest stories from i100
Have you tried new the Independent Digital Edition apps?
Independent Dating
and  

By clicking 'Search' you
are agreeing to our
Terms of Use.

ES Rentals

    iJobs Job Widget
    iJobs General

    Recruitment Genius: Office Administrator

    £14000 - £18000 per annum: Recruitment Genius: An Office Administrator is requ...

    Recruitment Genius: Sales Executive - Commercial Vehicles - OTE £40,000

    £12000 - £40000 per annum: Recruitment Genius: Due to expansion and growth of ...

    Ashdown Group: Senior PHP Developer - Sheffield - £50,000

    £40000 - £50000 per annum: Ashdown Group: Senior PHP Developer position with a...

    Recruitment Genius: Operations Leader - Plasma Processing

    Negotiable: Recruitment Genius: An Operations Leader is required to join a lea...

    Day In a Page

    Revealed: Why Mohammed Emwazi chose the 'safe option' of fighting for Isis, rather than following his friends to al-Shabaab in Somalia

    Why Mohammed Emwazi chose Isis

    His friends were betrayed and killed by al-Shabaab
    'The solution can never be to impassively watch on while desperate people drown'
An open letter to David Cameron: Building fortress Europe has had deadly results

    Open letter to David Cameron

    Building the walls of fortress Europe has had deadly results
    Tory candidates' tweets not as 'spontaneous' as they seem - you don't say!

    You don't say!

    Tory candidates' election tweets not as 'spontaneous' as they appear
    Mubi: Netflix for people who want to stop just watching trash

    So what is Mubi?

    Netflix for people who want to stop just watching trash all the time
    The impossible job: how to follow Kevin Spacey?

    The hardest job in theatre?

    How to follow Kevin Spacey
    Armenian genocide: To continue to deny the truth of this mass human cruelty is close to a criminal lie

    Armenian genocide and the 'good Turks'

    To continue to deny the truth of this mass human cruelty is close to a criminal lie
    Lou Reed: The truth about the singer's upbringing beyond the biographers' and memoirists' myths

    'Lou needed care, but what he got was ECT'

    The truth about the singer's upbringing beyond
    Migrant boat disaster: This human tragedy has been brewing for four years and EU states can't say they were not warned

    This human tragedy has been brewing for years

    EU states can't say they were not warned
    Women's sportswear: From tackling a marathon to a jog in the park, the right kit can help

    Women's sportswear

    From tackling a marathon to a jog in the park, the right kit can help
    Hillary Clinton's outfits will be as important as her policies in her presidential bid

    Clinton's clothes

    Like it or not, her outfits will be as important as her policies
    NHS struggling to monitor the safety and efficacy of its services outsourced to private providers

    Who's monitoring the outsourced NHS services?

    A report finds that private firms are not being properly assessed for their quality of care
    Zac Goldsmith: 'I'll trigger a by-election over Heathrow'

    Zac Goldsmith: 'I'll trigger a by-election over Heathrow'

    The Tory MP said he did not want to stand again unless his party's manifesto ruled out a third runway. But he's doing so. Watch this space
    How do Greek voters feel about Syriza's backtracking on its anti-austerity pledge?

    How do Greeks feel about Syriza?

    Five voters from different backgrounds tell us what they expect from Syriza's charismatic leader Alexis Tsipras
    From Iraq to Libya and Syria: The wars that come back to haunt us

    The wars that come back to haunt us

    David Cameron should not escape blame for his role in conflicts that are still raging, argues Patrick Cockburn
    Sam Baker and Lauren Laverne: Too busy to surf? Head to The Pool

    Too busy to surf? Head to The Pool

    A new website is trying to declutter the internet to help busy women. Holly Williams meets the founders