The length of the key, so that the appropriate size depending on the speed of the search key of the intruders and periods, the data is secure. For example, if intruders can be trial and error with a number of key 10 key within one second, and then the key length of 40 bits to protect the data, if intruders can 3484 try the key on one of the 1 million seconds (the current technology can do) are the key technologists.The length of 40 bits to protect the data, only 13 days only (which may not be sufficient in some manner.) With current technology, if intruders can try a number of keys in a second trip 1000 key size 128 bits of data can be protected, so the year 1022. with a key size of 128 bits. Gen. work will suffice to maintain the confidentiality of the information.
การแปล กรุณารอสักครู่..
