Security of information

According to the classical canons of information security by encrypting the three states of the safety information :

. Privacy Policy . Encryption is used to hide information from unauthorized users in transmission or storage. . Integrity. Encryption is used to prevent alteration of data during transmission or storage.
. Identifiability . Encryption is used to authenticate the source of information and the prevention of failure information from the sender to the fact that data has been sent to them.
It is known that any encryption system can be hacked. It is just that to gain access to a secure encrypted information may require an unacceptably large amount of time and resources. What does this mean and how does it look in real life? Imagine a situation where an attacker somehow managed to intercept encrypted information . Further actions attacker may be reduced to two ( a third possibility hacking, which is reduced to the exploits of the working environment ) options to hacking. They are: . Brute force , or Brute Force ( includes selection of all possible keys) .
. Or the attacker tries to find vulnerabilities in the algorithm.
Given the fact that the currently used encryption algorithms that have been scanned by “fire and time”, it is clear that an attacker will use the Brute Force. Hacking confidential information encrypted persistent algorithm and the key long enough (at least 512 bits ) will require on the part of a burglar using multiple supercomputers or distribution network from one to two hundred cars, and it’s a lot of time and money … But if the money is there , why and no! For example, in 1997 the organization Electronic Frontier Foundation (EFF) has announced a computer system that will be able to find a DES key in four days. Creating such a system cost the company $ 250,000 . With the help of modern equipment can determine the DES key by attacking the “brute force” in 35 minutes …