Jump to content

56-bit encryption

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Socrates2008 (talk | contribs) at 11:26, 8 September 2011 (ce). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In computing, 56-bit encryption refers to a key size of fifty-six bits, or seven bytes, for symmetric encryption; this represents a relatively low level of security in the context of a brute force attack.

Descrption

56-bit encryption has its roots in DES, which was the official standard of the US National Bureau of Standards from 1976, and later also the RC5 algorithm. US government regulations at the time required any users of stronger symmetric keys to submit to key recovery,[1] effectively allowing organisations such as the NSA to brute-force this encryption. Furthermore, software products exported from the United States were not permitted to use stronger than 56-bit encryption, requiring different software editions for the US and export markets.[2]

The advent of commerce on the Internet and faster computers raised concerns about the security of electronic transactions initially with 40-bit, and subsequently also with 56-bit encryption. In July 1998, a successful brute-force attack was demonstrated with a single desktop computer in just 56 hours.[3]

See also

References

  1. ^ "Hackers Prove 56-bit DES is not Enough". InfoWorld: 77. 30 June 1997.
  2. ^ "Microsoft Strong Encryption Downloads". Microsoft. 2011. Retrieved 8 September 2011.
  3. ^ Congressional Record, vol. V. 144, United States Senate, October 7, 1998 to October 9, 1998, p. 25124 {{citation}}: Check date values in: |date= (help); Unknown parameter |part= ignored (help)