Cyber Security: Keys Keys are pieces of information that determine the output from an encryption (or decryption) process. Keys may be:
A single cipher can produce an almost limitless number of different outputs with different key values, allowing secure communication even if the cipher itself is known to hostile third parties. Almost all ciphers are published in the scientific press or in standards documents. Having them available for widespread scrutiny allows many people to check that they are secure and do not contain weaknesses which could be exploited to compromise the security of the data encrypted using that cipher. The maths of a binary keyA computer encryption key is nothing more than a string of bits where each bit can have a value of either 0 or 1. The number of possible values for a key is simply the total number of values that the key can have. For example:
Each time we increase the length of the key by one bit we double the number of possible keys
The total number of keys can be written in scientific form as: 2key length Therfore a key with a length of eight bits has 28 – that is 256 – values. How long should a key be?Short keys are vulnerable to a brute force attacks - where a computer, or a number of computers, try every possible value for a key until they produce recognisable plaintext. Since computers can work through key values extremely rapidly, keys must be sufficiently long that they offer a very large number of possible values. Keys may be:
|
|