Why does key length matter? What is a brute force attack?
Encryption systems depend on two mechanisms to guarantee data confidentiality. The encryption algorithm provides the mathematical “rules” that convert the plain text message to a random ciphertext message. The algorithm provides steps for convolving the plain text message with an “encryption key,” a block of (typically) alphanumeric data that introduces the random element into the ciphertext message. The longer the secret key is, the more time it takes for an attacker to test all possible values of the key – and determine the plain text content of the message. In other words, data that will be valuable to an attacker for a long time should be encrypted with longer keys than ephemeral data. This sort of attack is called a brute force attack. Back to Top Q18: What VPN clients are available for Macintoshes? The following companies offer client software for Macintosh systems: • Netlock • Alta Vista/Digital/Compaq Back to Top Q19: What VPN clients are available for OS/2 systems? F/X Communi