40-bit encryption

40-bit encryption

40-bit encryption refers to a key size of forty bits, or five bytes, for symmetric encryption; this represents a relatively low level of security. A forty bit length corresponds to a total of 2^{40} possible keys. Although this is a large number in human terms (about a trillion, nearly two hundred times the world's human population), it is possible to break this degree of encryption using a moderate amount of computing power in a brute force attack — that is, trying out each possible key in turn.

On a typical home computer, a 40-bit key can be broken in a little under two weeks, testing a million keys per second. Using free time on a large corporate network or a set of zombie computers would reduce the time in proportion to the number of computers available. With dedicated (and rather expensive) hardware, a 40-bit key can be broken in seconds. The Electronic Frontier Foundation's Deep Crack, built by a group of enthusiasts for US$250,000 in 1998 could break a 56-bit Data Encryption Standard (DES) key in days, and would be able to break 40-bit DES encryption in about four seconds.

40-bit encryption was common in software released before 1996, when algorithms with larger key lengths could not legally be exported from the United States without a case-by-case license. As a result, the "international" versions of web browsers were designed to have an effective key size of 40 bits when using Secure Sockets Layer to protect e-commerce. Similar limitations were imposed on other software packages, including early versions of Wired Equivalent Privacy. In 1992, IBM designed the CDMF algorithm to reduce the strength of DES against brute force attack to 40 bits, in order to create exportable DES implementations.

Obsolescence

All 40-bit encryption algorithms are obsolete because they are dangerously vulnerable to brute force attacks, and therefore cannot be regarded as secure. As a result, virtually all web browsers now use 128-bit keys, which are considered strong. Some web servers will not communicate with a client unless it has a 128-bit encryption capability installed on it.

It should also be noted that public/private key pairs used in asymmetric encryption must be much longer than 128 bits for security; see key size for more details.

As a general rule, modern encryption algorithms such as AES use key lengths of 128, 192 and 256 bits.


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… …   Wikipedia

  • Bit manipulation — is the act of algorithmically manipulating bits or other pieces of data shorter than a byte. Programming tasks that require bit manipulation include low level device control, error detection and correction algorithms, encryption algorithms, and… …   Wikipedia

  • Encryption Control Protocol — Das Protokoll ECP (Encryption Control Protocol) ist ein Begriff aus der Informatik. ECP ermöglicht bei einer PPP (Point to Point Protocol) eine Verschlüsselung. Beispielsweise wird mittels 3DESE (Triple DES Encryption Protocol Extension) eine… …   Deutsch Wikipedia

  • encryption —    The process of encoding information in an attempt to make it secure from unauthorized access, particularly during transmission. There verse of this process is known as decryption.    Two main encryption schemes are in common use:    • Private… …   Dictionary of networking

  • Bit-flipping attack — A bit flipping attack is an attack on a cryptographic cipher in which the attacker can change the ciphertext in such a way as to result in a predictable change of the plaintext, although the attacker is not able to learn the plaintext itself.… …   Wikipedia

  • Bit Torrent — BitTorrent (protocole) Pour les articles homonymes, voir BitTorrent. BitTorrent est un protocole de transfert de données Pair à pair (P2P) à travers un réseau informatique. Le protocole a été conçu en avril 2001 et mis en place à l été 2002… …   Wikipédia en Français

  • Bit torrent — BitTorrent (protocole) Pour les articles homonymes, voir BitTorrent. BitTorrent est un protocole de transfert de données Pair à pair (P2P) à travers un réseau informatique. Le protocole a été conçu en avril 2001 et mis en place à l été 2002… …   Wikipédia en Français

  • Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …   Wikipedia

  • Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… …   Wikipedia

  • Format-preserving encryption — In cryptography, format preserving encryption (FPE) refers to encrypting in such a way that the output (the ciphertext) is in the same format as the input (the plaintext). The meaning of format varies. Typically only finite domains are discussed …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”