What Is 128-Bit and 256-Bit Encryption?

  • Thread starter Thread starter bhaazee
  • Start date Start date
  • Tags Tags
    Bit Encryption
Click For Summary

Discussion Overview

The discussion revolves around the concepts of 128-bit and 256-bit encryption, focusing on their definitions, key generation, and implications for security. Participants explore the technical aspects of encryption algorithms, key sizes, and the differences between symmetric and asymmetric cryptography.

Discussion Character

  • Technical explanation
  • Conceptual clarification
  • Exploratory

Main Points Raised

  • One participant requests a layman's explanation of 128-bit and 256-bit encryption, indicating a lack of knowledge in IT security.
  • Another participant explains that a key is created in cryptography, which is a sequence of bits used for encryption and decryption algorithms.
  • It is noted that 128-bit encryption has 2^128 possible keys, while 256-bit encryption has a keyspace of 2^256, highlighting the exponential increase in possibilities with each additional bit.
  • Participants discuss the types of symmetric ciphers, including stream ciphers and block ciphers, and mention various modes of operation like ECB, CBC, and CFB.
  • Asymmetric key cryptography is contrasted with symmetric, explaining how public and private keys are used for secure communication.
  • One participant emphasizes that a 256-bit key does not simply have twice the possibilities of a 128-bit key, but rather 2^128 times as many, illustrating the significance of bit size in encryption strength.
  • An analogy is provided comparing a Master Lock padlock to a 16-bit number to illustrate the concept of key combinations in physical security versus digital encryption.
  • A participant shares a resource for further learning about encryption, suggesting it provides a progression from basic to more complex descriptions.

Areas of Agreement / Disagreement

Participants generally agree on the definitions and implications of 128-bit and 256-bit encryption, but there are no explicit disagreements noted. The discussion remains exploratory without a definitive conclusion.

Contextual Notes

Some limitations include the potential for misunderstanding technical terms and the varying levels of knowledge among participants regarding cryptographic concepts.

Who May Find This Useful

This discussion may be useful for individuals interested in understanding the basics of encryption, particularly those with limited knowledge in IT security, such as students or professionals in non-IT fields.

bhaazee
Messages
79
Reaction score
0
Can anyone please explain me what's 128-bit and 256-bit encryption in layman's word (but bit in detail please). (I am a mechanical Engg. and have least knowledge on security aspects of IT).

Thnx.
 
Computer science news on Phys.org
To define 128 or 256-bit encryption, first a "key" is created. In computer cryptography, a key is a long sequence of bits used by encryption / decryption algorithms.

For example, the following represents a hypothetical 40-bit key:
00001010 01101001 10011110 00011100 01010101

A given encryption algorithm takes the original message, and a key, and alters the original message mathematically based on the key's bits to create a new encrypted message. Likewise, a decryption algorithm takes an encrypted message and restores it to its original form using one or more keys.

Using a 40-bit key(the above has 40 0's and 1's) is referred to as 40-bit encryption. 128 and 256-bit keys are keys with 128 and 256 number of 0's and 1's respectively.
 
Also, if you look at the key sizes, there are 2128 possible keys for a 128-bit encryption algorithm. For 256-bit keys, this is a keyspace of 2256 = 21282128.

Now, the actual encryption depends on the algorithm. Key sizes of 128 bits/256 bits will be for symmetric ciphers. For SSL, common algorithms are RC4 (a 128-bit stream cipher) and AES-128 and AES-256 in a mode like CFB (cipher feedback). Asymmetric key cryptography (e.g. RSA, DSA, El-Gamal) will typically have key sizes on the order of 2048 bits and up.

Symmetric ciphers are generally either stream ciphers, which produce a long stream of bits that are XORed with the plaintext, or block ciphers, which encrypt the message in blocks of a fixed number of bits. Block ciphers have different modes of operation; the most common include ECB (Electronic code book, in which blocks are encrypted independently--this is a weak mode and should be avoided), CBC (cipher block chaining, where the previous block is XORed with the plaintext of the next block and then encrypted) and CFB (cipher feedback, cipher output is XORed with plain text to get the ciphertext, previous block ciphertext is XORed with cipher output to link blocks).

For symmetric ciphers, both the sender and receiver must have the same key. By contrast, in asymmetric key cryptography, Alice and Bob each have a public and private key. If Alice wants to send a message to Bob, she looks up his private key, encrypts the message with it, signs it with her public key, and sends it to Bob. Bob receives the message and decrypts it with his private key. He can also decrypt the signature using Alice's public key and verify that the message has not been tampered with. Asymmetric key crypto usually involves "one way functions", which are easy to compute but computationally hard to compute the inverse.
 
A bit (binary digit) is either a 0 or 1. Since there are only two possible states the total number of combinations of an x bit number is 2x. In terms of encryption, the bits determine how many possible keys there could be. More possible keys means it will take longer for an attacker to try them all (called a brute force attack). It's important to note that a 256 bit key doesn't have twice as many possibilities as an 128 bit one. Each bit doubles the number of possibilities. Meaning that an 129 bit key would have twice the possibilities as an 128. A 256 bit key has 2128 times as many possibilities as an 128 bit one.
2128 = 3x1038
2256 = 1x1077

To use an analogy: a common Master Lock pad lock has 40 digits on its face. This gives 40 * 40 * 40 = 64,000 possible combinations. This is similar to a 16 bit number; 216 = 65,536. So one could say a common pad lock is roughly 16 bit. 16 bit is very low for encryption standards, however it is adequate for physical security because trying a combination will take a few seconds each. Compare this to a computer where one might be able to try anything from thousands to billions of possibilities per second and it becomes clear why the possibilities must be so much larger.

AES is a common modern encryption standard. If you have an interest in encryption this guide might be a good place to learn more. It does a good job of starting quite basic and progressing through four level of more complex and accurate descriptions.
http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html"
 
Last edited by a moderator:
Oh! thanks a lot guys for ur patient replies. understood very easily.
 

Similar threads

  • · Replies 17 ·
Replies
17
Views
16K
  • · Replies 27 ·
Replies
27
Views
3K
Replies
5
Views
869
Replies
7
Views
3K
  • · Replies 52 ·
2
Replies
52
Views
7K
  • · Replies 3 ·
Replies
3
Views
4K
Replies
11
Views
6K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 4 ·
Replies
4
Views
2K
  • · Replies 11 ·
Replies
11
Views
1K