Algorithms
In this section, I’ll briefly discuss the impact of key size on security. Then I’ll introduce the algorithms that will be used in this book.
Size Does Matter
Key size affects the security of signatures and ciphers. In general, the longer the key, the harder it will be for an attacker to decrypt your ciphertext or forge a signature. Basically, longer keys have more possible values. If your attacker is trying every possible key to find the right one (a brute-force attack), a longer key gives the attacker more work. Keep in mind, however, that key size is only part of the story. A long key won’t do you much good if the algorithm itself is weak.
Asymmetric ciphers and signatures have a variable key size. It’s up to your application or users to choose an appropriate key length. Although longer keys are more secure, they are also slower. Picking the right key size is a trade-off between finding a comfortable level of security and having your application run too slowly.
Symmetric ciphers can either have a fixed or variable key length; it depends on the algorithm.
Names and Numbers
Table 2.1 summarizes the algorithms that I’ll use in this book. We’ll implement the ElGamal signature and cipher algorithms in Chapter 9. All the other algorithms have been implemented as part of software supplied by Sun™.
Name |
Type |
Reference |
MD5 |
Message digest |
RFC 1321 |
SHA-1 |
Message digest |
NIST FIPS 180-1 http://www.nist.gov/itl/div897/pubs/fip180-1.htm ... |
Get Java Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.