Why do big corporations use such large encryption keys?

  • Thread starter SW VandeCarr
  • Start date
  • Tags
    Code
In summary, the article discusses the concept of factorization and its role in encryption, specifically in the RSA cryptosystem. It explains that the larger the key size, the harder it is to break the encryption, and provides tables estimating the time it would take to break a given key size. It also mentions that big corporations do use this encryption technique, but the keys have to continuously increase in size to maintain their security.
  • #1
SW VandeCarr
2,199
81
Simple question. I understand that the product of two "large" primes is a nearly unbreakable code. How large is "large" and if it's that easy, why aren't big corporations using this?
 
Technology news on Phys.org
  • #3
SW VandeCarr said:
Simple question. I understand that the product of two "large" primes is a nearly unbreakable code. How large is "large" and if it's that easy, why aren't big corporations using this?
In essence, they are. One technique that's used is public key encryption, which relies on two keys -- a public key and a private key.

"Unbreakable" is a relative term. Encryptions that were unbreakable by a single computer ten or twenty years ago were able to be broken using large networks of computers, each working in parallel to search for a factorization of a large composite number with two prime factors. As a result we've seen the keys get larger in size. See http://en.wikipedia.org/wiki/Key_size and http://en.wikipedia.org/wiki/Key_(cryptography).
 

1. How does a virtually unbreakable code work?

A virtually unbreakable code uses highly complex mathematical algorithms and advanced computer programming techniques to encrypt data in such a way that it is virtually impossible to decode without the correct key or password.

2. Is it really impossible to break a virtually unbreakable code?

While it is theoretically possible for a virtually unbreakable code to be cracked, it would require an immense amount of computational power and time. In practical terms, a virtually unbreakable code is considered to be extremely difficult, if not impossible, to break.

3. Can a virtually unbreakable code be used for all types of data?

A virtually unbreakable code can be used to encrypt any type of data, including text, images, videos, and more. However, the level of security may vary depending on the strength of the code and the encryption methods used.

4. Who uses virtually unbreakable codes and for what purposes?

Virtually unbreakable codes are used by various organizations and individuals, including governments, military, financial institutions, and businesses, to protect sensitive and confidential information. They are also used for secure communication and data sharing.

5. Are there any known vulnerabilities or weaknesses in a virtually unbreakable code?

While a virtually unbreakable code is considered to be highly secure, there are always potential vulnerabilities and weaknesses that may be discovered over time. This is why it is important to regularly update and strengthen encryption methods to stay ahead of potential threats.

Similar threads

  • Programming and Computer Science
Replies
14
Views
2K
  • Programming and Computer Science
Replies
3
Views
968
  • Programming and Computer Science
Replies
1
Views
507
  • Programming and Computer Science
Replies
13
Views
4K
  • Programming and Computer Science
Replies
18
Views
1K
  • Programming and Computer Science
Replies
17
Views
1K
  • Programming and Computer Science
Replies
1
Views
692
  • Programming and Computer Science
Replies
1
Views
695
  • Programming and Computer Science
Replies
14
Views
2K
  • Programming and Computer Science
Replies
2
Views
379
Back
Top