Solved

AES 256-bit encryption and Skype

Posted on 2004-08-17
2
3,037 Views
Last Modified: 2009-01-27
hello there,
Anyone using Skype? (www.skype.com)

i learnt that skype uses AES 256-bit encryption to secure its instant messaging, file transfer and pc-to-pc voice call. (btw the quality of the voice calls is excellent, even for dialup users like me!)

my question is: how strong is this "AES 256-bit encryption"? and how safe would it be if i wanted to transfer so-called "sensitive" data or to talk about "sensitive" things with my friends in china? you know there are more than 40000 internet cops out there working day and night to monitor what people are doing on the net. and if they find something "anti-revolutionary" or "politically wrong", they'll start to trace you and soon you'll be in trouble...i don't want my friends be in trouble but i want to let them know what is going on in their country---they need some fresh air and freedom, not all the craps from the government don't they?

any help/comments would be greatly appreciated.
KEN
0
Comment
Question by:ken021600
2 Comments
 
LVL 1

Accepted Solution

by:
aspirine earned 300 total points
ID: 11938840
Hi,
AES is considered to be one of the best encryption algorithms nowadays, most governments use it.
If you took a million-dollar mainframe computer to brute-force (that is, try all possible keys) an AES 128 bit key, it would take billions of years to break it.
Even taking in mind a possible hardware revolution that would make computers to be hundreds of times faster than they are today, it would still take thousands of years to break that long of a key (and that's being really optimist about the future of computing).

Just for the record, a 256 bit key is 1.1 x 10^77 characters long

Conclusion: Seeing as it would take thousands of times the age of the universe to crack an AES 256 key with current technologies. It can be considered pretty secure :)
0
 

Expert Comment

by:benjamin_smee
ID: 12265317
everything the above poster says is completely true. AES is the replacement for DES (standing for advanced encryption standard and digital encryption standard) and as such is THE standard for encryption. It had to pass a number of tests to get that position and beat of a number of competing algorithyms. It is the most secure encryption we have right now.

That said it is important to realise that while brute forcing the key would take a infeasable amount of time, it is more likely that a discovery in mathematics will break aes in the form of factorisation or quantum computing. If there was a breakthrough in either of these fields then AES would be useless. Just what capabilities the NSA have in this regard, I for on don't know, but I doubt they would be interested in exposing it just to crack your conversations ;)
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
LDAP client connectivity issue 7 119
Linux  : how to view CPU info and  its usage details 7 258
Kali Linux Word list 6 874
discontinue use of the VeriSign G2 Root Certificate 9 88
​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question