Cryptographic Key Sizes

This cluster debates the security of various cryptographic key lengths like 128-bit, 256-bit, and larger against brute-force attacks, emphasizing that even 128 bits is practically unbreakable while larger sizes provide extra margins.

📉 Falling 0.5x Security
2,296
Comments
20
Years Active
5
Top Authors
#6261
Topic ID

Activity Over Time

2007
2
2008
6
2009
23
2010
45
2011
55
2012
86
2013
223
2014
137
2015
181
2016
190
2017
150
2018
95
2019
165
2020
133
2021
170
2022
128
2023
194
2024
153
2025
151
2026
9

Keywords

RAM DES e.g US schneier.com DSA FAST KDF SSH wikipedia.org 256 128 aes bits key brute keys brute force bit 64

Sample Comments

Scaevolus Feb 7, 2017 View on HN

With a secret state of 128 bits or more, you can't brute force it before the sun burns out.

bajsejohannes Dec 17, 2012 View on HN

This a very good explaination of why 256 bits is enough against a brute force attack. The goal of breaking cryptographic systems is of course not brute force, but to reduce the actual key space you have to search. This is frequently measured in how many redundant bits you can shave off. So for AES, we might find in the future that 256 bits isn't enough after all.

pdimitar Dec 21, 2024 View on HN

btw what's wrong with 512-bit keys?

EliAndrewC Sep 8, 2013 View on HN

There are 340282366920938463463374607431768211456 possible 128-bit keys. So if you had a machine that could check a trillion possible keys per second it would take over 10 quintillion years to try all possible 128-bit keys.

kennethreitz Dec 6, 2010 View on HN

"A device that could check a billion billion (1018) AES keys per second would in theory require about 3×1051 years to exhaust the 256-bit key space." - wikipedia

zanny Jan 23, 2013 View on HN

I was under the impression that even a 128 bit keyspace is prohibitively hard to crack using modern hardware, and that 256 bit would take more computational resources than we can reasonably expect to have available to us for the rest of time. Isn't 1024 bit a bit overkill?

cjslep Sep 22, 2014 View on HN

Crypto is only finitely strong (even if very large).

imaginenore Dec 14, 2015 View on HN

1024 bit keys are endangered? Only in some broken encryption schemes. You can't even break 256 bits, as the number of possibilities exceeds the number of atoms in the universe.

ryan-c Mar 20, 2014 View on HN

64 bits isn't enough to provide brute force protection, you need at least 80 bits, preferably 128 bits, and 256 bits if you're paranoid.

JoachimSchipper Jun 23, 2010 View on HN

It doesn't work like that. If you use this to create, say, a cryptographic key, you can break it if you can bruteforce an 80-bit key; depending on the specific application, you may need much less (e.g. if you can perform a birthday attack, you only need 2^40 tries).