Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Introduction to cryptology: Pt. 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
3. What makes a cryptographic protocol strong?
  


Key lengths and brute-force attacks, part 3 page 8 of 10


Alice feels much more secure with her 64-bit keys and new algorithm (mutatis mutandis). But still, 10 days for an attack is not completely unrealistic if she has an important enough message to send. So, suppose Alice now decides on a 96-bit algorithm (otherwise DES-like in decryption time). By brute-force, Mallory and his TLA will need 2^40 hours to mount a brute-force attack on the message; in other words, Alice's message appears safe (against this particular attack) for 125 million years. Sounds pretty good, huh?


Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact