There was a limit on key strength at 40 bits. Americans were allowed 56 bits (OK, they didn’t really get the full 56 bits, but that is another story). The Electronic Frontier Foundation built “Deep Crack” in 1998, a custom machine that broke the 56 bit DES in two seconds, so it probably would have taken them 1/8 second to crack the 40 bit. This happened when the ban was still active.
This led to two movements: creative export and hosting of >40 bit algorithms outside the US, and development of better algorithms outside the US, like Rijndaal, SERPENT, IDEA, E2, and other non-US AES-candidates.
WolfLink@sh.itjust.works 6 months ago
All encryption can be brute forced, the point of having a large key size is to make the compute effort needed to brute force the key impractical.
“Impractical” for an individual, even one that has several very powerful computers (by DIY standards) is a much lower bar than impractical for a government, that might use huge supercomputing clusters or hardware designed specifically for brute forcing encryption.
Note that the recommended key size to protect from “individual” tier hackers has increased over the years as the power of the average personal computer has increased.