Brute Force Attack
Even if a symmetric cipher is currently unbreakable by exploiting structural weaknesses in its algorithm, it is possible to run through the entire space of keys in what is known as a brute force attack. Since longer symmetric keys require exponentially more work to brute force search, a sufficiently long symmetric key makes this line of attack impractical.
With a key of length n bits, there are 2n possible keys. This number grows very rapidly as n increases. Moore's law suggests that computing power doubles roughly every 18 to 24 months, but even this doubling effect leaves the larger symmetric key lengths currently considered acceptable well out of reach. The large number of operations (2128) required to try all possible 128-bit keys is widely considered to be out of reach for conventional digital computing techniques for the foreseeable future. However, alternative forms of computing technology are anticipated which may have superior processing power than classical computers. If a suitably sized quantum computer capable of running Grover's algorithm reliably becomes available, it would reduce a 128-bit key down to 64-bit security, roughly a DES equivalent. This is one of the reasons why AES supports a 256-bit key length. See the discussion on the relationship between key lengths and quantum computing attacks at the bottom of this page for more information.
Read more about this topic: Key Size
Famous quotes containing the words brute force, brute, force and/or attack:
“Brute force crushes many plants. Yet the plants rise again. The Pyramids will not last a moment compared with the daisy. And before Buddha or Jesus spoke the nightingale sang, and long after the words of Jesus and Buddha are gone into oblivion the nightingale still will sing. Because it is neither preaching nor commanding nor urging. It is just singing. And in the beginning was not a Word, but a chirrup.”
—D.H. (David Herbert)
“All generous minds have a horror of what are commonly called facts. They are the brute beasts of the intellectual domain. Who does not know fellows that always have an ill-conditioned fact or two that they lead after them into decent company like so many bull-dogs, ready to let them slip at every ingenious suggestion, or convenient generalization, or pleasant fancy? I allow no facts at this table.”
—Oliver Wendell Holmes, Sr. (18091894)
“Some sepulcher, remote, alone,
Against whose portal she hath thrown,
In childhood, many an idle stone
Some tomb from out whose sounding door
She neer shall force an echo more,
Thrilling to think, poor child of sin!
It was the dead who groaned within.”
—Edgar Allan Poe (18091849)
“Hence that general is skilful in attack whose opponent does not know what to defend; and he is skilful in defense whose opponent does not know what to attack.”
—Sun Tzu (6th5th century B.C.)