rtcvb32: [
DES 56 bit keys were relatively secure up to the mid 90's, but is woefully inadequate today.
onarliog: I doubt single pass DES was ever rolled out with security as the primary goal :) But let's not drift into conspiracy theories...
As i understand it. DES originally had a 64bit key space. However the NSA demanded he weaken it so they could break it if they had to. I think it was the NSA could brute force all the keys in a day at 56 bits, back in the 90's.
rtcvb32: What's secure today is now more determined by how long before it would be broke with today's tech,
onarliog: I disagree with this. Cryptanalysis hardly relies on technology, as demonstrated by the practical security of AES today (the many purely academic attacks on weak variations are irrelevant to us here). DES and RSA had theoretical shortcomings which lead to the attacks in the first place, which were in turn made feasible by the advancing tech, no?
If in 5 years computers are 10,000x stronger than they are today, not including hardware-specific brute forcing, then it doesn't matter how secure something is, the limited keyspace can still be brute-forced faster. Not to mention NSA and other large groups will have thousands of computers all working in parallel to break keys.
Although weaknesses in encryption are preferred and brute forcing is the last resort, it doesn't change it much. The 8bit computers were 3Mhz, we are now having multi-core 4Ghz processors, in only the span of a few decades. If they can't boost the speed they will keep adding cores. But it won't be too long before they drop Silicon for a better material.