Âé¶¹´«Ã½

Letter: Maximum security

Published 10 April 1999

From Mike Orton

The Royal Mail is apparently going to sell us an e-mail electronic stamp in
the form of a 128-bit public key encryption system. Furthermore, it isn’t
insisting on key escrow
(This Week, 27 March, p 17).

At first sight it seems a good idea, but with only a 128-digit public key,
key escrow is not required. The system is just plain insecure.

An ad hoc panel of cryptography experts has recently published a report
recommending 500 digits for minimum security for public key ciphers. Public key
ciphers are usually based on the RSA system, which relies on the time taken to
factor a composite number N (1024 digits long) into its two prime
factors, p1 and p2 where
N = p1 × p2.

With modern encryption systems, it is never appropriate to use less than the
maximum-security level. If you were stupid enough to use 128 digits for bank
transfers up to £1000, 400 digits for up to £10 000, and 1024 digits
for transactions above £100 000, you would enable an opponent to narrow
his attack by concentrating on the most potentially profitable keys.

If you have a strong system, use it for everything. Suppose that GCHQ can
break a 1024 digit key in three hours. It could cope with eight messages a day.
If you flooded it with 800 messages a day it would never keep up.

Harlech, Gwynedd

Issue no. 2181 published 10 April 1999

Sign up to our weekly newsletter

Receive a weekly dose of discovery in your inbox. We'll also keep you up to date with Âé¶¹´«Ã½ events and special offers.

Sign up
Piano Exit Overlay Banner Mobile Piano Exit Overlay Banner Desktop