What’s the deal with encryption strength —is 128 bit encryption enough or do you need more? (2024)

What’s the deal with encryption strength —is 128 bit encryption enough or do you need more? (1)

There are a lot of cloud services that tout encryption strength as a measure of how well they guard your data. It is quoted in bits, which is the size of the key. So you see services quoting 128 bit, 256 bit or even 2048 bit.

What about these numbers​? Surely 256 is better than 128, and 2048 is even better yet.

What does it all mean, and how much do you need?

Encryption on computers uses the same principle as encryption of messages over the ages. To conceal information someone scrambles (encrypts) a message using a key. The key could be any text. Before computers it was often an agreed-on passage from a book. To descramble (decrypt) the message the key is used to reverse the encryption and arrive at the original message.

If you don’t have the key you are reduced to cracking the encryption by brute force. This means trying every possible key until you hit upon the right one.

In software, keys are usually a random string of characters. Each character is 8 bits. So, for example, 16 random characters is 128 bits. If you have a monster 256-character key, it is 2048 bits.

Now to crack modern computerized cryptography there are no short cuts. The encryption (scrambling the data) is done so that no extra information can be derived from the encrypted data. The only way to crack it is brute force.

So how long does that take? Can the NSA or other state actors crack all encryption? How many bits of encryption make your data secure?

First thing is, don’t panic. The claims made about the capabilities of code crackers are usually exaggerated. As Edward Snowden said, ‘trust the math.’ Mathematics is a fact. The NSA is constrained by it as much as everyone. So we can take a look at the math and draw some conclusions.

One simple fact is that each bit you add to a key doubles the number of possible keys and hence doubles the amount of time it takes to try all possible keys, i.e. a brute force attack.

One of the faster performed computer tasks is done by bitcoin miners who use massive banks of specialized hardware to evaluate a hashing function 300 quadrillion times a second (that’s three hundred thousand trillion).

But how does the computer power to evaluate their hashing function compare to trying to see if a key is the right one for a set of data in the course of a brute force attack.

Well it is a lot harder to decrypt a block of text with a key than to do what the bit coin miners do, but in the spirit of erring on the conservative side, even though testing a key takes orders of magnitude more computing, we will assume that a state actor could test a million trillion keys a second.

Now if we look at how many possible 64-bit keys there are (multiply 2 by itself 64 times) we get about a million trillion. So that would mean that the maximum possible decryption speed available today would be able to brute force a 64 bit key in a second.

That might sound scary. If you have a 128-bit key, and a 64-bit key can be cracked in a second, surely the 128-bit key will be vulnerable.

Not so fast. There are around 32 million seconds in a year. 32 million is 25 doublings. So if you can crack a 64-bit key in a second it will take a year for an 89-bit key (64 + 25). A million is 20 doublings, so an 109-bit key will take a million years.

Your 128-bit key is still 19 bits longer, which multiplies the time by 500,000. So to crack a 128-bit key with modern hardware is going to take around 500 billion years.

Moore’s law says that computers get twice as fast every 2 years. In cryptography terms that means that advances in computer power will give you one extra bit every two years. That is, if you can crack a 64-bit key in a second this year, you should be able to crack a 65-bit key in a second 2 years later.

On that basis increases in computer power would bring the time to crack a 128-key down to one year 78 years from now and 128 years to bring it down to a second.

Given that our estimates are probably orders of magnitude better than what can actually be done we can conclude that 128 bit encryption is absolutely safe for the rest of the century from known technology.

So is there any technology that will speed up these attacks?

Many people point to quantum computing , claiming it will allow the decryption of long keys in incredibly short times.

However quantum computing is aimed at public-key cryptography which is another type of cryptography. Public-key cryptography is very important in that it is the technology that drives secure communications such as SSL used to secure websites and the digital signing of documents, but it takes much more computer time and hence is not used for encryption of whole documents. Whether quantum computing will ever be practical remains to be seen, but it is not something that would apply to the type of cryptography we are talking here.

Bottom line: If you or your service providers use 128-bit encryption you can relax — there are other things much more serious to worry about.

What’s the deal with encryption strength —is 128 bit encryption enough or do you need more? (2024)

FAQs

Is 128-bit encryption good enough? ›

128-bit encryption is a data/file encryption technique that uses a 128-bit key to encrypt and decrypt data or files. It is one of the most secure encryption methods used in most modern encryption algorithms and technologies. 128-bit encryption is considered to be logically unbreakable.

Why is 128bit encryption less secure than 256bit encryption? ›

With binary keys, each bit added to the key length doubles the key space. This means that AES-256 has 2^128 or 340,282,366,920,938,463,463,374,607,431,768,211,456 times as many keys as AES-128. As a result, a brute force attack against an AES-256 key is much harder than against an AES-128 key.

Is 128-bit encryption hackable? ›

As shown above, even with a supercomputer, it would take 1 billion billion years to crack the 128-bit AES key using brute force attack.

How hard is it to break 128-bit encryption? ›

The EE Times points out that even using a supercomputer, a “brute force” attack would take one billion years to crack AES 128-bit encryption.

Will we ever need 128-bit? ›

A 128-bit processor may never occur because there is no practical reason for doubling the basic register size. One of the reasons for migrating from 32-bit to 64-bit computers was memory (RAM) addressing; however, for all practical purposes, there was only a need for a few more bits beyond 32 (see binary values).

Is 256-bit encryption better than 128? ›

Comparing 128 bit vs. 256 bit encryption algorithms, we can find that the main difference lies in the security key length that is 128 bit and 256 bit, respectively. The 256 bit algorithm provides a much more secure protocol than 128 bit algorithm.

Top Articles
BitPay: Buy Crypto Without Fees | Store, Swap & Spend Bitcoin
Why Is Printer Ink So Expensive? | Ink Is The Black Gold
Danielle Moodie-Mills Net Worth
Loves Employee Pay Stub
Dew Acuity
Crocodile Tears - Quest
Aiken County government, school officials promote penny tax in North Augusta
Ou Class Nav
Rubfinder
The Haunted Drury Hotels of San Antonio’s Riverwalk
Tugboat Information
Celsius Energy Drink Wo Kaufen
Pwc Transparency Report
104 Whiley Road Lancaster Ohio
Dr. med. Uta Krieg-Oehme - Lesen Sie Erfahrungsberichte und vereinbaren Sie einen Termin
Conan Exiles Colored Crystal
iZurvive DayZ & ARMA Map
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
1989 Chevy Caprice For Sale Craigslist
18889183540
Sullivan County Image Mate
Dcf Training Number
Optum Urgent Care - Nutley Photos
Sunset Time November 5 2022
LCS Saturday: Both Phillies and Astros one game from World Series
Craigslist Lake Charles
Anonib Oviedo
Bidrl.com Visalia
Arlington Museum of Art to show shining, shimmering, splendid costumes from Disney Archives
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
8002905511
Yayo - RimWorld Wiki
Astro Seek Asteroid Chart
Www.1Tamilmv.con
Mobile crane from the Netherlands, used mobile crane for sale from the Netherlands
Rek Funerals
Blush Bootcamp Olathe
3473372961
Ff14 Laws Order
Mrstryst
Composite Function Calculator + Online Solver With Free Steps
Kelly Ripa Necklace 2022
Felix Mallard Lpsg
Mytime Maple Grove Hospital
Citymd West 146Th Urgent Care - Nyc Photos
John Wick: Kapitel 4 (2023)
Hillsborough County Florida Recorder Of Deeds
Premiumbukkake Tour
About us | DELTA Fiber
Elvis Costello announces King Of America & Other Realms
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 6516

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.