Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security

Length: 884 words (2.5 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

The use of encryption is as old as the art of communication. In times of war encryption was called 'code,' and could be employed to keep the enemy from obtaining the contents of transmissions. Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the 'scrambling' of voice signals more complex ciphers work according to sophisticated computer readings that rearrange the data bits in digital signals. In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key undoes the work of the encryption. Alternatively, a computer can be used in an attempt to 'break' the cipher. The more complex the encryption, the more difficult it becomes to eavesdrop on the communications. Hacker's part in breaking encryption can be either simple or devastatingly advanced. With tools called hex editors (Rootshell), Hackers are able to 'decode' the encryption. The tedious task includes decompiling the executable file, thus coding the transmission. Since there are currently 72 quadrillion possible encryption keys, for each given message, the key is chosen at random from its enormous database of keys, and these servers as a problem. Hackers have to tend with the newest standard 56-bit key coding, which servers as a tedious task (that's why they call them 'hackers') since encryption is the toughest to crack, it seems to be of larger standard. Internet companies, businesses, groups, and other miscellaneous programs have turned to its protection. It serves as a safe house for critical information. Together, firewalls and encryption of files can be counted as one of the most secure ways of protecting information. Although, Hackers can and will find ways to elu...

... middle of paper ...

... Commonly used, trustworthy symmetric algorithms include the following: Data Encryption Standard (DES), which uses a key of 64 bits (actually, only 56 bits are effectively used) International Data Encryption Algorithm (IDEA), which uses a key of 128 bits Rivest Cipher 4 (RC4), which uses variable-sized keys Rivest Cipher 5 (RC5), which is actually a family of algorithms using keys up to 2,048 bits. The term "strong" in the protocol security context often has a specific meaning that is not immediately apparent, but which skirts the issue you raise. "Strong authentication" means crypto-based authentication, irrespective of the algorithm or key length employed. the reason is that crypto-based authentication protocols have the capability to be strong, e.g., by selection of appropriate algorithms and key lengths, whereas password-based protocols typically do not.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Application Letter For A Commercial Door Essay

- Doors in your building should be form-fitting, sturdy, secure and well-made. Your building, especially if it?s your commercial business, is a vital part of your everyday operations whether you rent the place to tenants, own a retail shop or house a factory. This is why you need professional installers to handle your commercial door needs. Read on to discover how new commercial doors can save you money and bring you peace of mind. Security Physical security is a major concern for your business or commercial property....   [tags: Computer security, Security, The Doors]

Better Essays
794 words (2.3 pages)

Champion National Security : Security Services Essay

- Champion National Security has been providing contractual security services since the company was founded in 1980, by Jim Carrol and Robert Merino. For the past 35 years the company has grown to over 1500 employees in over 10 states including New Jersey (Champion National Security, 2015). Champion National Security provides services to commercial, industrial, medical, hospitality, and residential industries, in which all services are tailored to the client to include traditional security services, 24/7 surveillance and monitoring, loss prevention, luxury brand and protection, crisis management, parking lot and vehicle security, response and emergency response services, uniformed security, an...   [tags: Security guard, Security, Security police]

Better Essays
1296 words (3.7 pages)

Essay about Singapore Hotel Security Conference

- A Hotel Security Conference 2007 was held in Singapore with the Senior Minister of State for Law and Home Affairs of Singapore addressing the public, and highlighting the need to enhance building security especially hotels. Ho (2007) has specially mentioned in this forum the usage and to incorporate CPTED considerations in future building or redevelopment plans, and as early as possible in all building design plan. He further mentioned that this approach will make security and criZXCxcsDDvcwvme prevention activity much more effective in the long term....   [tags: Security ]

Better Essays
1285 words (3.7 pages)

The Security Of A Security Essay

- Abstract This paper focusses on the analysis of the importance of the security baselines by critically looking at the significance of this security baselines on the computer operating system, application system, and various computer network components. This paper, therefore, strives to provide the organizations that do not have security guidelines in place reasons to adopt them by clearly laying down the benefits that will trickle down to them and the security risks they will be protected against....   [tags: Computer security, Security, Information security]

Better Essays
1420 words (4.1 pages)

Essay Screeners and Airport Security

- “There’s no such thing as absolute security. Life entails risk, and all security involves trade-offs.” says Bruce Schneier the author of Schneier on Security. We believe the way our security is now keeping us safer. We have this belief when in all actuality our security system is flawed. When you and your luggage are having to go through a full body scanner, possibly being called out from the no fly list when you know in fact that it is not you, and our security is costing our airlines and passengers a great deal of money, and possible and actual threats are getting through, something might need to be done about our airport security....   [tags: commercial art travel systems]

Better Essays
548 words (1.6 pages)

Commercial Penetration Testing Essay

- Commercial penetration testing is the process of controlled security assessment or audits performed in such a manner as to reveal weakness and vulnerabilities. These processes help expose infrastructure weaknesses which in turn allows a company to implement fixes for these security holes. While this process simulates real world attacks, it is not a random brute force undertaking. In commercial penetration testing there are standards and methodologies that provide a detailed roadmap of practical ideas and proven practices (Halfond, 2011)....   [tags: controlled security assessment]

Better Essays
1379 words (3.9 pages)

How the Aspects of Commercial AirTravel Have Changed Over the Last Fifty Years

- From the congested seats of the economy cabin, where the constant crinkling of peanut wrappers, snores of sleepy sightseers, and tears of testy toddlers are all to be heard, to the leisurely lounge chairs of first class, air travel has changed in more ways than one since the first passenger bearing flight in 1919 (Grant 132). The air travel industry has experienced considerable changes; the majority of which occurred between the mid-1950s and today. Every aspect of commercial aviation has been changing over the last fifty years....   [tags: airline regulations, flying safety and security]

Better Essays
1638 words (4.7 pages)

Network Physical Threats Essay

- ... Making company employees aware of these tactics can help prevent them from disclosing vital information. Individuals with limited knowledge of computer systems cause unstructured threats against networks. They have tools such as shell scripts and password crackers that can cause serious disruption to networks. Preventative measures for these types of attacks could include network monitoring devices, firewalls, and intrusion detection/prevention systems. A network administrator can also allow only specified MAC addresses onto the network....   [tags: security, minimal disruptions, preventions]

Better Essays
941 words (2.7 pages)

Essay about Hyundai Commercial Analysis

- The Hyundai commercial caught my attention due to its interesting plot. It seems to be a typical car advertisement until you look at it with deeper thought. The situation reveals something totally opposite of what they actually meant to do. Hyundai may have known exactly what they were doing, putting an advertisement out there that would not be easily forgotten. However the impact of this message can be an extremely negative image for Hyundai. The image they end up portraying can cause extremely negative publicity or send people the wrong message....   [tags: suicide, hyundai commercial]

Better Essays
981 words (2.8 pages)

IT Security Essay

- Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks....   [tags: Cyber-security, Enterprise Security]

Better Essays
3468 words (9.9 pages)