Block cipher: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
imported>Sandy Harris |
||
Line 1: | Line 1: | ||
=== Adequate key size === | === Adequate key size === | ||
Any cipher can be broken by a [[brute force]] attack if its key size is inadequate. Current block ciphers all use at least 128-bit keys to protect against this; many support larger keys as well. For a block cipher, the cost of brute force increases as 2<sup>keysize-1</sup>. For discussion, see the [[Brute_force#Symmetric_ciphers | symmetric ciphers]] section of the "brute force attacks" article. | Any cipher can be broken by a [[brute force]] attack if its key size is inadequate. Current block ciphers all use at least 128-bit keys to protect against this; many support larger keys as well. For a block cipher, the cost of brute force increases as 2<sup>keysize-1</sup>. For discussion, see the [[Brute_force#Symmetric_ciphers | symmetric ciphers]] section of the "brute force attacks" article. | ||
Revision as of 10:57, 26 October 2008
Adequate key size
Any cipher can be broken by a brute force attack if its key size is inadequate. Current block ciphers all use at least 128-bit keys to protect against this; many support larger keys as well. For a block cipher, the cost of brute force increases as 2keysize-1. For discussion, see the symmetric ciphers section of the "brute force attacks" article.