Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Key size
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Significance== [[Key (cryptography)|Keys]] are used to control the operation of a cipher so that only the correct key can convert encrypted text ([[ciphertext]]) to [[plaintext]]. All commonly-used ciphers are based on publicly known [[algorithm]]s or are [[open-source model|open source]] and so it is only the difficulty of obtaining the key that determines security of the system, provided that there is no analytic attack (i.e. a "structural weakness" in the algorithms or protocols used), and assuming that the key is not otherwise available (such as via theft, extortion, or compromise of computer systems). The widely accepted notion that the security of the system should depend on the key alone has been explicitly formulated by [[Auguste Kerckhoffs]] (in the 1880s) and [[Claude Shannon]] (in the 1940s); the statements are known as [[Kerckhoffs' principle]] and Shannon's Maxim respectively. A key should, therefore, be large enough that a brute-force attack (possible against any encryption algorithm) is infeasible – i.e. would take too long and/or would take too much memory to execute. [[Claude Shannon|Shannon's]] work on [[information theory]] showed that to achieve so-called '[[perfect secrecy]]', the key length must be at least as large as the message and only used once (this algorithm is called the [[one-time pad]]). In light of this, and the practical difficulty of managing such long keys, modern cryptographic practice has discarded the notion of perfect secrecy as a requirement for encryption, and instead focuses on [[computational security]], under which the computational requirements of breaking an encrypted text must be infeasible for an attacker.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)