• The concept of key range and key-size are related to each other. Key Range is total number of keys from smallest to largest available key. An attacker usually is armed with the knowledge of the cryptographic algorithm and the encrypted message, so only the actual key value remains the challenge for the attacker.
• If the key is found, the attacker can get original plaintext message. In the brute force attack, every possible key in the key-range is tried, until we get the right key.
• In the best case, the right key is found in the first attempt, in the worst case, the key is found in the last attempt. On an average, the right key is found after trying half of the possible keys in the key-range. Therefore by expanding the key range to a large extent, longer it will take for an attacker to find the key using brute-force attack.
• The concept of key range leads to the principle of key size. The strength of a cryptographic key is measured with the key size
• Key size is measured in bits and is represented using binary number system. Thus if the key range from 0 to 8, then the key size is 3 bits or in other words we can say if the size is bits then the key range is 0 to 256. Key size may be varying, depending upon the applications and the cryptographic algorithm being used, it can be 40 bits, 56 bits, 128 bits & so on. In order to protect the cipher-text against the brute-force attack, the key-size should be such that the attacker can not crack it within a specified amount of time.
• From a practical viewpoint, a 40-bit key takes about 3 hours to crack, however a 41-bit key would take 6 hours and 42-bit key would take 12 hours & so on. This means every additional bit doubles the amount of time required to crack the key. We can assume that 128 bit key is quite safe, considering the capabilities of today’s computers. However as the computing power and techniques improve, these numbers will change in future.
Explain the concept of Key Range and Key Size
feel free to contact us info@mybscit.com
-
What are the typical phases of operation of a virus?
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, phases of a virus, phases of a virus in network security, tybscit network security phases of a virus, 0
The first stage is called Pre-trigger stage or the dormant stage. In this stage viruses lie dormant, and does...
-
Implement Advance Encryption Standard algorithm
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes, download bscit notes of Mumbai University, Implement Advance Encryption Standard algorithm, network security notes, network security notes for tybscit semester 5, network security practicals, 0
The Following example explains Implement Advance Encryption Standard.
-
Explain Phishing
Kaushik Kini, , Network Security, atul kahate notes network security, Explain Phishing, network security notes, tybscit network security, tybscit network security Phishing, 0
Phishing has become a big problem in recent times. In 2004, the estimated losses due to phishing were to...
-
Multiple Columnar – Transposition Technique
Web Master, , Network Security, atul kahate notes network security, download bscit notes of Mumbai University, Multiple Columnar Transposition Technique, network security notes, network security notes for tybscit semester 5, Simple columnar transposition technique, 0
Multiple columnar transposition technique (i.e simple columnar with multiple rounds) To improve basic Simple columnar transposition technique, we can...
-
What are ethical and legal issues in computer security system ?
Kaushik Kini, , Network Security, atul kahate notes network security, ethical and legal issues, ethical and legal issues in network security, network security notes, tybscit network security, tybscit network security ethical and legal issues, 0
Most ethical and legal issues in computer system are in the area of individual’s right to privacy versus the...
-
Rail Fence Algorithm
Web Master, , Network Security, atul kahate notes network security, network security notes, Rail Fence, Rail Fence Algorithm, Rail Fence Algorithm in network security, tybscit network security, tybscit network security Rail Fence Algorithm, 0
Rail fence cipher The rail-fence technique is an example of transposition technique. It uses a simple algorithm. Steps...
-
Implement Caesar Cipher in Network Security tybscit Semester 5
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes, Caesor Cipher in Network Security tybscit Semester 5, download bscit notes of Mumbai University, network security notes, network security notes for tybscit semester 5, network security practicals, 0
The following example explains Caesar Cipher in Network Security and its implementation. Click here to download the PDF
-
Explain Caesar Cipher
Kaushik Kini, , Network Security, atul kahate notes network security, Caesar Cipher, Caesar Cipher in network security, network security notes, tybscit network security Caesar Cipher, 0
Caesar cipher is substitution technique cipher In Caesar cipher we replace each alphabet with the alphabet that is actually...
Green Computing Book
C++ Interview Questions
Categories
- Advance Java (15)
- Advance Sql (8)
- ASP.NET with C# (16)
- Computer Graphics (3)
- Cyber Law (22)
- Digital Electronics 16-17 (2)
- Fybscit Semester 1 (1)
- FYBSCIT Semester 1 Question Bank (2)
- Fybscit Semester 2 (1)
- Imperative Programming (6)
- Linux Administration (3)
- Unit 1 (3)
- Network Security (33)
- News (40)
- Posts (1)
- Professional Communication Skills (2)
- Project (1)
- Project Management (1)
- Software Testing (1)
- Tybscit Question Papers (11)
- Semester V (7)
- Semester VI (4)
Recent Posts
- TYBSCIT Semester 5 Question Paper and Solution November 2017 (C75:25)
- TYBSCIT Semester 5 Exam Dates of October 2017 CBSGS 75:25 Postponed
- Tybscit Semester 5 Question Paper & Solutions November 2016 (75:25)
- FYBSCIT Semester 1 Question Paper & Solutions – October 2016 (75:25)
- FYBSCIT Semester 2 Question Paper & Solutions – March 2017
Recent Comments
- Web Master on JSplitPane Example in Advance java – Tybscit Semester 5
- priya on JSplitPane Example in Advance java – Tybscit Semester 5
- Web Master on TYBSCIT Semester V KT Results Announced April 2016
- Web Master on TYBSCIT Semester V KT Results Announced April 2016
- Web Master on Question Bank for Operating System fybscit semester 1