SlideShare a Scribd company logo
Information about key and ciphers
● Encryption is only as strong as the key used to
run the cipher in most cases.
● A strong key is essential to have effective
encryption.
● Many of the most used ciphers are freely
available to all, therefore the key is very
important.
● Key length is normally referred to in bits
– The longer the key length, typically the more
secure the key
– A short key (ex. 8 bit) could be easily
guessed by a normal computer
– A long key (ex. 256 bit) would be very difficult
and time consuming for a computer to
guess.
– The computer would have to generate every
single number that the key could be, which
if it is a long key, could be billions (or more!)
of numbers.
– It would then have to apply every one of
those numbers to the cipher until the key
was found
● The combination of a long length key, and a
complex cipher can make encryption
effectively unbreakable
– It's commonly accepted that no encryption is
“unbreakable”, but the intent of the
encryption is to make it so difficult and
expensive to break the encryption that no
one would attempt it.
– For example, the National Security Agency
maintains that 128bit encryption ran
through the AES cipher is acceptable for
use for all civilian activities
● 128bit AES encryption is acceptable for the
Government to encrypt up to Secret
information
● 192bit AES encryption is considered good
enough to encrypt up to Top Secret
information
● 256bit encryption is considered to be so good
that so far no one has been able to break it
(or admitted to breaking it).
● Encryption standards and products are
typically mandated and controlled by the
government.
– Generally ciphers are governed by the
government as a class of weapon
– Exporting a cipher to another country can end
with you arrested for weapons trafficking
and terrorism charges
– The man that developed and released free-
of-charge the encryption standard that you
probably use in your email account was
charged with weapon based offenses for
doing so.
Summary
● Encryption will only be as good as the cipher
and length of key that you use.
● Control of ciphers is tightly managed by the
US Government (particularly the NSA)
● Proper use of ciphers and good keys can
make your computer magnitudes more
secure.
Summary
● Encryption will only be as good as the cipher
and length of key that you use.
● Control of ciphers is tightly managed by the
US Government (particularly the NSA)
● Proper use of ciphers and good keys can
make your computer magnitudes more
secure.

More Related Content

PPTX
Hacking its types and the art of exploitation
PDF
CryptoMondays - Suren Ravindra - Knabu - August 2019
PPT
N5 security precautions
PDF
Protect Your Data Now
PDF
APT(Advanced Persistent Threats) & strategies to counter APT
PDF
Incident response, Hacker Techniques and Countermeasures
PDF
Eng12
PDF
Security & privacy on the internet: things you should now
Hacking its types and the art of exploitation
CryptoMondays - Suren Ravindra - Knabu - August 2019
N5 security precautions
Protect Your Data Now
APT(Advanced Persistent Threats) & strategies to counter APT
Incident response, Hacker Techniques and Countermeasures
Eng12
Security & privacy on the internet: things you should now

Viewers also liked (6)

PPT
Basic encryption
PDF
Js on-microcontrollers
PDF
Lua on Steroids
PPT
Lua vs python
PDF
Using ngx_lua in UPYUN
PPTX
Lua: the world's most infuriating language
Basic encryption
Js on-microcontrollers
Lua on Steroids
Lua vs python
Using ngx_lua in UPYUN
Lua: the world's most infuriating language
Ad

Similar to Key and cipher overview (20)

PPT
crypto slide for students, check out the good article
PPTX
Encryption And Decryption Using AES Algorithm
PDF
The ultimate privacy guide
PDF
Securing your Bitcoin wallet
PPTX
Networking Security in data communication.pptx
PDF
Cryptology - The practice and study of hiding information
ODP
CISSP Week 16
PDF
Week12
PDF
PDF
Sw2 b12
PPTX
PDF
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
PPT
enkripsi and authentication
PPTX
AES-GCM common pitfalls and how to work around them.pptx
PPTX
Encryption by fastech
PDF
digital signature for SMS security
PPTX
Cryptography and Network Security
PDF
Security Fundamentals
PDF
Security fundamentals
PDF
How encryption works
crypto slide for students, check out the good article
Encryption And Decryption Using AES Algorithm
The ultimate privacy guide
Securing your Bitcoin wallet
Networking Security in data communication.pptx
Cryptology - The practice and study of hiding information
CISSP Week 16
Week12
Sw2 b12
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
enkripsi and authentication
AES-GCM common pitfalls and how to work around them.pptx
Encryption by fastech
digital signature for SMS security
Cryptography and Network Security
Security Fundamentals
Security fundamentals
How encryption works
Ad

Recently uploaded (20)

PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
Business Acumen Training GuidePresentation.pptx
PDF
Business Analytics and business intelligence.pdf
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
1_Introduction to advance data techniques.pptx
PDF
annual-report-2024-2025 original latest.
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Computer network topology notes for revision
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPT
Quality review (1)_presentation of this 21
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PDF
Lecture1 pattern recognition............
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
Business Acumen Training GuidePresentation.pptx
Business Analytics and business intelligence.pdf
Acceptance and paychological effects of mandatory extra coach I classes.pptx
1_Introduction to advance data techniques.pptx
annual-report-2024-2025 original latest.
Miokarditis (Inflamasi pada Otot Jantung)
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Computer network topology notes for revision
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Quality review (1)_presentation of this 21
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Fluorescence-microscope_Botany_detailed content
Qualitative Qantitative and Mixed Methods.pptx
Lecture1 pattern recognition............
IBA_Chapter_11_Slides_Final_Accessible.pptx
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx

Key and cipher overview

  • 1. Information about key and ciphers ● Encryption is only as strong as the key used to run the cipher in most cases. ● A strong key is essential to have effective encryption. ● Many of the most used ciphers are freely available to all, therefore the key is very important.
  • 2. ● Key length is normally referred to in bits – The longer the key length, typically the more secure the key – A short key (ex. 8 bit) could be easily guessed by a normal computer – A long key (ex. 256 bit) would be very difficult and time consuming for a computer to guess. – The computer would have to generate every single number that the key could be, which if it is a long key, could be billions (or more!) of numbers. – It would then have to apply every one of those numbers to the cipher until the key was found
  • 3. ● The combination of a long length key, and a complex cipher can make encryption effectively unbreakable – It's commonly accepted that no encryption is “unbreakable”, but the intent of the encryption is to make it so difficult and expensive to break the encryption that no one would attempt it. – For example, the National Security Agency maintains that 128bit encryption ran through the AES cipher is acceptable for use for all civilian activities ● 128bit AES encryption is acceptable for the Government to encrypt up to Secret information
  • 4. ● 192bit AES encryption is considered good enough to encrypt up to Top Secret information ● 256bit encryption is considered to be so good that so far no one has been able to break it (or admitted to breaking it).
  • 5. ● Encryption standards and products are typically mandated and controlled by the government. – Generally ciphers are governed by the government as a class of weapon – Exporting a cipher to another country can end with you arrested for weapons trafficking and terrorism charges – The man that developed and released free- of-charge the encryption standard that you probably use in your email account was charged with weapon based offenses for doing so.
  • 6. Summary ● Encryption will only be as good as the cipher and length of key that you use. ● Control of ciphers is tightly managed by the US Government (particularly the NSA) ● Proper use of ciphers and good keys can make your computer magnitudes more secure.
  • 7. Summary ● Encryption will only be as good as the cipher and length of key that you use. ● Control of ciphers is tightly managed by the US Government (particularly the NSA) ● Proper use of ciphers and good keys can make your computer magnitudes more secure.