From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Desirable qualities of an algorithm and key, continued

Desirable qualities of an algorithm and key, continued

From the course: Ethical Hacking: Cryptography

Desirable qualities of an algorithm and key, continued

- [Presenter] Now it's time to talk about what are the desirable qualities of a key as the other key factor in securing a cryptosystem? When we review encryption algorithms individually later in this course, you'll learn that some allow you to select the length of the encryption key. While the general rule is the longer the key, the better, we must also consider trade-offs that as the key length gets longer, so does the amount of time it takes to respond, which could also lead to performance issues. Let's take a look at a simple chart. On the X axis, you can see clearly the relationship that as the key length increases, so does the response time in seconds displayed on the Y axis. Seconds doesn't sound like much, but scaled up, it can become a major setback, causing us to take a deeper look at balancing resource consumption in different scenarios. The next desirable quality of a key is simply being random. Keys are generated using random number generations or key derivation functions,…

Contents