Why Aren't 128 Bit Public Keys Used for Encryption on the Internet?

  • Thread starter q3snt
  • Start date
  • Tags
    Encryption
In summary, systems on the internet typically use 128-bit public keys while banks use 512-bit public keys. The record for cracking a 512-bit public key encrypted message is under 24 hours. While the keyspace of a 128-bit key is much smaller than that of a 512-bit key, it is still possible to accidentally crack a 512-bit key within ten seconds. However, public key encryption serves as a deterrent and is sufficient for protecting e-business traffic. Public key systems are only used to exchange key data for a more secure symmetric cryptosystem, and the symmetric key data is random, making it difficult to crack. It is more secure to regenerate public keys for each transaction.
  • #1
q3snt
I was wondering about this:

Most systems on the internet use 128 bit public keys, banks internal systems use 512 bit public keys. The current record for cracking a 512 bit public key encrypted message is under 24 hours.
http://www.andya.org.uk/jsplay/codeworks.html

So if banks use 128 bit public keys as and a 512 bit public key was crackable in less then 24 hours, then a 128 bit public key must be exponentially easier to crack so how come hackers never go after that?
 
Last edited by a moderator:
Computer science news on Phys.org
  • #2
All you can say about key length is the average amount of time it would take to crack a key of that length. The keyspace of a 128-bit key is 2^384 times smaller than that of a 512-bit key, so it's much easier to crack, on average.

However, every now and then you'll come across a 512-bit key that you crack -- rather accidentally -- within ten seconds.

There are no truly secure cryptosystems, aside from one-time pads, and computerized encryption serves only as a deterrent. Certainly, no one is going to spend their entire lifetime trying to get your credit card number, so existing cryptosystems are perfectly adequate for protecting your e-business traffic.

- Warren
 
  • #3
I originally had a much longer question, which explained what I was asking better but I edited it because I thought it might be confusing. But anyways my question was concerning the differences between private key (symmetric), and public key (asymmetric) encryption. Which I learned about when I was reading the the page from the link I gave.

Anyways the point is that asymmetric encryption works on a different principal than symmetric encryption.

chroot said:
The keyspace of a 128-bit key is 2^384 times smaller than that of a 512-bit key, so it's much easier to crack, on average.
Based on the this info: (http://www.andya.org.uk/jsplay/codeworks.html) I am not sure if saying that a 512 bit key is 2^384 times harder to crack than a 128 bit key would be correct when you are talking about public keys.

chroot said:
Certainly, no one is going to spend their entire lifetime trying to get your credit card number
It may take billions of years to crack a private key encrypted document, but as my earlier quote said it is much easier to crack a public key encrypted document. According to the site I quoted it takes less than 24 hours to crack a 512 bit public key encrypted document. So a 128 bit public key should be way easier to crack, and that is what the internet uses.
 
  • #4
There is no such thing as a private key or public key encrypted document.
The document is encrypted by an encryption algorithm, public key is a way of swapping the encryption keys used for by whatever algorithm you choose.

The 512bit 'key' is not just used to simply xor the message n times as described in that site, it was giving this as a very simple example of what key lengths mean.
 
  • #5
The keyspace of a 512-bit key is 2^384 times larger than the keyspace of a 128-bit key.

The website you keep linking seems to be quite full of crap, actually. It reads like a student's term paper on the subject of cryptography, contains many obvious errors, and I would certainly not treat it as being in any way authoritative. He's trying to sell you on XORing, for God's sake. Find a real reference. Look up the sci.crypt FAQ, or buy Applied Cryptography.

"The internet" does not use 128-bit keys. Your browser and a TLS (SSL) server will negotiate the most secure method available between them. If your browser supports 512-bit keys, and your website supports 512-bit keys, then you'll be using 512-bit keys.

- Warren
 
  • #6
mgb_phys,

If your document is encrypted with a 512-bit random key (as in a symmetric key system) it is much harder to crack than a document encrypted with a 512-bit number that it is the multiplication of two primes (as in a public key system). Obviously there are far fewer such 512-bit numbers to search!

- Warren
 
  • #7
chroot said:
It reads like a student's term paper on the subject of cryptography, contains many obvious errors, and I would certainly not treat it as being in any way authoritative.

You are far too kind; I would say that the author of that page has never studied crypto at all, let alone enough to have written a term paper. On the mistakes, I agree -- it's riddled with them.
 
  • #8
chroot said:
If your document is encrypted with a 512-bit random key (as in a symmetric key system) it is much harder to crack than a document encrypted with a 512-bit number that it is the multiplication of two primes (as in a public key system). Obviously there are far fewer such 512-bit numbers to search!

True, but isn't key exchange usually done at 1024 bits? Since it only happens once per communication, it's usually at a much higher encryption level than the message itself.
 
Last edited:
  • #9
CRGreathouse,

You're correct. Public-key cryptosystems are only used to exchange key data for an agreed-upon symmetric cryptosystem. The actual data going through a TLS (SSL) connection is actually being encrypted with a much more secure symmetric cryptosystem.

The weak link, of course, is the key exchange. If an attacker can break the public-key cryptosystem, he/she can recover the symmetric key and thus the rest of the data. However, the symmetric key data is random, so cracking the key exchange is made much more difficult.

- Warren
 
  • #10
Thanks for the info about sci.crypt FAQ, that looks like a good reference.

Anyways, it makes sense that they are secure since the only way to crack them is to factor them which is supposedly intractable and plus, using the weak link chain theory, it would be unreasonable for an attacker to try to crack a key to get some information when they could just plant a keylogger or something.

Btw do public keys get regenerated every time you make a transaction, or does each computer have 1 that they use, because it would seem more secure to regenerate them for each transaction?
 
Last edited by a moderator:
  • #11
Factoring is difficult, but not impossible. Most of the cryptography contests out there are factoring contests. If or when someone comes up with a new algorithm or a new computing theory (like quantum computation), all of these cryptosystems will be broken at once.

The very purpose of public key cryptography is the keys never change! You should be able to publish your public key in the New York Times and have people use it to contact you securely.

- Warren
 
  • #12
The very purpose of public key cryptography is the keys never change! You should be able to publish your public key in the New York Times and have people use it to contact you securely.

Just to elaborate...the sender would encrypt the message with the public key and the receiver would decrypt it with his/her private key. If the sender wanted the receiver to be able authenticate them and verify the integrity of the message they could encrypt a hash of the message with their private key and the receiver could decrypt it with the sender's public key, recompute the hash, and check it against the one that was received.
 

FAQ: Why Aren't 128 Bit Public Keys Used for Encryption on the Internet?

Can all types of encryption be cracked?

No, not all types of encryption can be cracked. There are different levels of encryption, and some are more difficult to crack than others. However, with enough time, resources, and advanced technology, it is possible to crack even the strongest encryption.

How do hackers crack encryption?

Hackers use a variety of methods to crack encryption, including brute force attacks, social engineering, and exploiting vulnerabilities in the encryption algorithm. They may also use tools and software specifically designed for cracking encryption codes.

Is encryption crackable in real-time?

No, encryption is not crackable in real-time. It takes a significant amount of time and resources for even the most advanced technology to crack encryption. This is why encryption is still considered a secure method of protecting sensitive information.

Can encryption be cracked by individuals or only by organizations with advanced technology?

Both individuals and organizations with advanced technology can potentially crack encryption. While individuals may not have the same resources as organizations, they can still use tools and methods to attempt to crack encryption. However, organizations with advanced technology may have a higher likelihood of successfully cracking encryption.

What can I do to protect my encrypted data from being cracked?

To protect your encrypted data from being cracked, you can use strong encryption algorithms, regularly update your encryption software, and use multiple layers of encryption. It is also essential to follow best practices for password protection and network security to prevent hackers from accessing your encrypted data.

Similar threads

Replies
14
Views
2K
Replies
2
Views
2K
Replies
1
Views
2K
Replies
13
Views
3K
Replies
4
Views
1K
Replies
10
Views
3K
Replies
7
Views
3K
Replies
7
Views
3K
Replies
1
Views
3K
Back
Top