Definitions
Sorry, no definitions found. Check out and contribute to the discussion of this word!
Etymologies
Sorry, no etymologies found.
Support
Help support Wordnik (and make this page ad-free) by adopting the word 40-bit.
Examples
-
The clip demonstrates a “Weak Scheduling Attack” against a 40-bit key in action with KisMAC.
WEP Cracking Redux: Beyond The Command Line | Lifehacker Australia 2009
-
A weak 40-bit algorithm doesn't make this attack easier, and a strong 256-bit algorithm doesn't make it harder.
-
A weak 40-bit algorithm doesn't make this attack easier, and a strong 256-bit algorithm doesn't make it harder.
-
First it was the 40-bit key, a few months later the 48-bit key, followed by the 56-bit key, and later the 512 bit has been broken ...
Boing Boing: February 9, 2003 - February 15, 2003 Archives 2003
-
There also can be little dispute that information encrypted at the 40-bit level no longer provides sufficient protection against even casual hackers using idle computers.
Testimony Before The Judiciary Committee Concerning The Need For Strong, Legal Computer Encryption 1996
-
Students with Ecole Polytechnique and at our own MIT have "brute force cracked" such 40-bit encryption.
Testimony Before The Judiciary Committee Concerning The Need For Strong, Legal Computer Encryption 1996
-
But this 40-bit level ignores the facts that: the current world benchmark is DES with 56-bit keys; hundreds of alternatives are available from foreign manufacturers and off the Internet (about half using DES); and
Testimony Before The Judiciary Committee Concerning The Need For Strong, Legal Computer Encryption 1996
-
American software companies have been forced to continue limiting the strength of their encryption to the 1992 40-bit key length level -- despite an Administration commitment at that time to increase key lengths regularly to take into account technological and market developments.
Testimony Before The Judiciary Committee Concerning The Need For Strong, Legal Computer Encryption 1996
-
Indeed, a report released earlier this year by seven of the leading private sector cryptologists and computer scientists highlighted the vulnerability of 40-bit keys to commercial attack.
Testimony Before The Judiciary Committee Concerning The Need For Strong, Legal Computer Encryption 1996
-
In 2010 ARM announced a 40-bit virtual memory extension for ARM v7, which uses a two-stage address translation to get around the 4GB memory limitation.
Wired Top Stories Jon Stokes 2011
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.