56-bit encryption
In computing, 56-bit encryption refers to a key size of fifty-six bits, or seven bytes, for symmetric encryption; this represents a relatively low level of security in the context of a brute force attack.
Descrption
56-bit encryption has its roots in DES, which was the official standard of the US National Bureau of Standards from 1976, and later also the RC5 algorithm. US government regulations at the time required any users of stronger symmetric keys to submit to key recovery,[1] effectively allowing organisations such as the NSA to brute-force this encryption. Furthermore, software products exported from the United States were not permitted to use stronger than 56-bit encryption, requiring different software editions for the US and export markets.[2]
The advent of commerce on the Internet and faster computers raised concerns about the security of electronic transactions initially with 40-bit, and subsequently also with 56-bit encryption. In July 1998, a successful brute-force attack was demonstrated with a single desktop computer in just 56 hours.[3]
See also
References
- ^ "Hackers Prove 56-bit DES is not Enough". InfoWorld: 77. 30 June 1997.
- ^ "Microsoft Strong Encryption Downloads". Microsoft. 2011. Retrieved 8 September 2011.
- ^ Congressional Record, vol. V. 144, United States Senate, October 7, 1998 to October 9, 1998, p. 25124
{{citation}}
: Check date values in:|date=
(help); Unknown parameter|part=
ignored (help)