Custom Search

Cyber Security:

Keys

Keys are pieces of information that determine the output from an encryption (or decryption) process.

Keys may be:

known to the user in the form of passwords,

may be stored in a computer's hardware (such as the decryption keys stored on a DVD player that allow it to play the encrypted data stored on the movie disk),

be generated by a computer as and when they are needed (such as conducting a secure transaction on a shopping site).

A single cipher can produce an almost limitless number of different outputs with different key values, allowing secure communication even if the cipher itself is known to hostile third parties.

Almost all ciphers are published in the scientific press or in standards documents. Having them available for widespread scrutiny allows many people to check that they are secure and do not contain weaknesses which could be exploited to compromise the security of the data encrypted using that cipher.

The maths of a binary key

A computer encryption key is nothing more than a string of bits where each bit can have a value of either 0 or 1.

The number of possible values for a key is simply the total number of values that the key can have.

For example:

a one-bit long key can only have two possible values: '0' and '1'

a two-bit key could have one of four possible values: '00', '01', '10' and '11'

Each time we increase the length of the key by one bit we double the number of possible keys

a three-bit key has eight possible values

– '000', '001', '010', '011', '100', '101', '110' and '111'

The total number of keys can be written in scientific form as:

2key length

Therfore a key with a length of eight bits has 28 – that is 256 – values.

How long should a key be?

Short keys are vulnerable to a brute force attacks - where a computer, or a number of computers, try every possible value for a key until they produce recognisable plaintext.

Since computers can work through key values extremely rapidly, keys must be sufficiently long that they offer a very large number of possible values.

Keys may be:

known to the user in the form of passwords,

may be stored in a computer's hardware (such as the decryption keys stored on a DVD player that allow it to play the encrypted data stored on the movie disk),

be generated by a computer as and when they are needed (such as when conducting a secure transaction on a shopping site).

 

See 'The Key Distribution Problem'

See 'Asymmetric Encryption'

See 'Symmetric Encription'