Encryption Strength
Three important factors determine the strength of any encryption
1 Key length
2 Key management policies
3 Nature of the encryption algorithm
Longer keys provide stronger encryption by reducing the number of repeating blocks of ciphertext. This makes it harder to spot patterns in the ciphertext that reflect patterns in the original plaintext. For example, the is one of the most common three-letter words in English. Each character in English is represented by an 8-bit code. Thus, a 24-bit encryption key would create ciphertext in blocks that represent thee consecutive characters. Such a short key is weak because it provides an opportunity to identify commonly recurring block of ciphertext like to represent common words, thereby enabling the analyst to "break" the encryption code.
The procedures used to store and manage the encryption key are also important. Indeed, this is often the most vulnerable aspect of encryption system. No matter how strong an encryption algorithm is, if the keys have been compromised, the encryption can be easily broken. Encryption keys should not be stored on the computer that uses them. It is also important to store a coppy of keys in a secure location (a process referred to as key escrow) so that in the event an employee leaves the organization for any reason, the data can be decrypted.
Encryption Strength
Three important factors determine the strength of any encryption
1 Key length
2 Key management policies
3 Nature of the encryption algorithm
Longer keys provide stronger encryption by reducing the number of repeating blocks of ciphertext. This makes it harder to spot patterns in the ciphertext that reflect patterns in the original plaintext. For example, the is one of the most common three-letter words in English. Each character in English is represented by an 8-bit code. Thus, a 24-bit encryption key would create ciphertext in blocks that represent thee consecutive characters. Such a short key is weak because it provides an opportunity to identify commonly recurring block of ciphertext like to represent common words, thereby enabling the analyst to "break" the encryption code.
The procedures used to store and manage the encryption key are also important. Indeed, this is often the most vulnerable aspect of encryption system. No matter how strong an encryption algorithm is, if the keys have been compromised, the encryption can be easily broken. Encryption keys should not be stored on the computer that uses them. It is also important to store a coppy of keys in a secure location (a process referred to as key escrow) so that in the event an employee leaves the organization for any reason, the data can be decrypted.
การแปล กรุณารอสักครู่..
