All you need to know about remote desktop encryption - RealVNC® (2024)

You must prevent unauthorized individuals with fraudulent or destructive intentions from gaining control of your corporate systems and resources.

Looking for remote access software thatticks every security boxand meets industry compliance standards, (GDPR, HIPAA and PCI-DSS)? Take a free 14-day trial of VNC Connecthere.

While absolute security can never be fully guaranteed, applying many layers of security features is an acknowledged best practice for creating strong defences. One security capability frequently associated with remote access is data encryption; sometime referred to as end-to-end encryption.

This blog explores the purpose, basic architecture of encryption and the practical differences between different levels of encryption.

The purpose of encryption for remote access

When aremote accesssession is established between two devices, screen image and control activities are passed back and forth, and this data must be protected to keep it confidential. You can think of this as a physical pipe through which the screen and control data is streamed.

This pipe requires a hard, external shell to stop someone from seeing what’s flowing inside and prevent them from changing it. Encryption is the mathematical shell that protects the data stream.

There are different levels of encryption that vendors refer to in their promotional materials such as 128 or 256-bit AES, which reflects the algorithm used to protect the data (AES) and how hard it is for an attacker to break in (128 or 256-bit).

To continue the pipe analogy, these different levels of encryption could be seen as pipes built to the same principles (e.g. ‘the AES technique’) but with different materials. While all the pipes are tough, some materials are more resistant than others, and will take longer and require more effort to breach.

Encryption basics

Encryption is a mathematical algorithm that is used to lock the data stream being passed between two devices (end-to-end) during a remote access session. The key to this lock is a secret number known only to the sender and receiver, and that changes with each session.

The level of encryption reflects the number of possible key combinations. The higher the number of bits of encryption the greater the number of possible keys, so the more difficult it is to compromise the encryption.

A 128-bit level of encryption has 2128 possible key combinations (340,282,366,920,938,463,463,374,607,431,768,211,456 – 39 digits long) and 256-bit AES encryption has 2256 possible key combinations (a number 78 digits long).

Because of the way the mathematics works, 256-bit encryption is not twice as hard to break in to or ‘crack’ as 128-bit encryption, but 340 billion-billion-billion-billion times harder.

What would it take to break in?

To crack either of these encryption levels would be extremely time consuming given the total number of possible key combinations and the current state of computer processing.

‘Extremely time consuming’ is in fact a gross understatement – even if you build a world-wide network of super-computers designed just for the purpose of trying combinations as fast as possible, it would still take more than 100 billion years on average to stumble on the right one. For comparison, the universe has only been around for 13.8 billion years.

This also assumes that you could afford the astronomical energy bills required to run the system for that long – a significant fraction of the total energy use of the planet each year, for 100 billion years. A 256-bit key would be 340 billion-billion-billion-billion times as impossible.

Is 256-bit the maximum level of encryption for remote access software?

So why are some vendors starting to promote 512-bit encryption? They rely on busy people assuming that 512-bit is ‘twice as good’ as 256-bit,howeverthe originalAES standardonlyspecified 3 key sizes– 128, 192 and 256 bits.

These key sizes have been proven to becryptographically secure,so although512-bit AEScould betheoreticallycreated,it wouldn’t betried and tested.

They may argue that as processor technology advances, it becomes more feasible to crack existing levels of encryption. Until we see widespread adoption of cheap, powerful and reliable quantum computers, we cannot even begin to contemplate such a scenario, which is why most experts agree that 128 and 256-bit AES encryption are sufficiently complex to remain extremely robust for many years to come.

Which encryption level is best for remote connections?

So, after all this explanation, which level of encryption is appropriate for your specific environment? The answer depends on the needs of your environment, but one very important point worth making is that encryption is essential.

Be aware that there is free, open-source remote access software, which provides no encryption out of the box. Using unencrypted remote access software within a business environment is simply a bad idea – it allows anyone to view and modify your remote control session, without any indication of it occurring.

The price you will pay for a commercial remote access software subscription is minor compared to the risks you will introduce to your business by using “free” unencrypted product. A single successful attack could cost your business tens of thousands of dollars in compromised bank accounts, lost data, blackmail or reputational damage. Don’t take this risk.

Choosing the best level for your needs

128-bit AES encryption
• Highly robust
• Nearly impossible to crack
• Still the strong default choice for all traditional commercial applications
• Accepted as providing a very high level of security

256-bit AES encryption
• Current gold standard for futureproofing against new technology
• Even harder to compromise than 128-bit
• Takes more processing power to encrypt and decrypt data, can lower performance
• No reason to deploy it unless it is truly needed e.g. military/government

256-bit encryption is sufficient to protect against sustained attacks from very sophisticated criminal gangs or the resources associated with rogue state entities. Given the quality of this level of encryption, it is often mandated by standard bodies associated with the financial, medical and security industries.

In particular, it’s considered safe enough to protect TOP-SECRET classified information. You should insist on 256-bit AES encryption if you have very high security requirements or if it is specified in a standard that is essential to your industry.

So, what’s the verdict?

End-to-end data encryption is essential for any commercial deployment of remote access software. In combination with additional security features such asmulti-factor authenticationand controlled teams and groups, you can create a highly secure remote access strategy.

The question of choosing between 128-bit and 256-bit AES encryption for remote desktop connections must be addressed individually, and the answer largely depends on the sensitivity of your data and the requirements and standards defined by your industry.

Of course, whichever level of encryption you go for, it’s not the only thing to consider when ensuring your data stays safe during a remote desktop session. Making sure you have unique passwords, staying off public Wi-Fi, and keeping track of your old accounts all contribute to your overall security. If you are interested in learning more, read ourRemote Access Security Checklist

WithVNCConnect Professional, every connection is end-to-end 128-bit AES encrypted. Or, with an Enterprise subscription, you can increase this to 256-bit AES encryption. Give it a try with a14-day free trial of VNC Connect.

All you need to know about remote desktop encryption - RealVNC® (2024)

FAQs

Is 128 or 256 encryption better? ›

Comparing 128 bit vs. 256 bit encryption algorithms, we can find that the main difference lies in the security key length that is 128 bit and 256 bit, respectively. The 256 bit algorithm provides a much more secure protocol than 128 bit algorithm.

How secure is Realvnc? ›

VNC Connect is secure out-of-the-box. All connections are encrypted end-to-end, and by default remote computers are protected by a password or by system login credentials, depending on your subscription.

What encryption does VNC use? ›

When using VNC Connect, you can rest assured that your data is protected by encryption. All connections are encrypted end-to-end using up to 256-bit AES, 2048-bit RSA keys and perfect forward secrecy. This means that sessions are entirely private to you, now and in the future.

How many possible 256-bit keys are there? ›

A 128-bit level of encryption has 2128 possible key combinations (340,282,366,920,938,463,463,374,607,431,768,211,456 – 39 digits long) and 256-bit AES encryption has 2256 possible key combinations (a number 78 digits long).

How hard is it to crack 256-bit encryption? ›

It indicates that if a hacker wants to decrypt data encrypted with 256-bit encryption, they need 256 different amalgamations to crack the data. This is practically impossible to crack, and even the world's supercomputers may require many years to get the combination by trying the trial-error method.

How easy is it to crack 256-bit encryption? ›

With the right quantum computer, AES-128 would take about 2.61*10^12 years to crack, while AES-256 would take 2.29*10^32 years.

How insecure is VNC? ›

On that front, it is essential to remember that many VNC products do not support passwords longer than eight characters, so they are inherently insecure even when the sessions and passwords are encrypted.

Is VNC safer than RDP? ›

VNC vs RDP security.

While prior versions were vulnerable to man-in-the-middle attacks, RDP's security is improved with each version. While some VNC software employs Secure Shell (SSH), which is less secure. And VNC also provides users with full access to connect to remote devices.

Is VNC obsolete? ›

Misconception: VNC technology is outdated

VNC technology was developed over 20 years ago, but it has significantly evolved. VNC Connect is monitored and updated regularly to fix any bugs and to address customer needs as they change with the times.

How do I make my VNC connection secure? ›

Using Secure VNC Settings
  1. Enable Secure Mode.
  2. Enable Use Password and set a strong password (not needed in Secure Mode). The maximum length for this password is 8 characters.
  3. Enable Prompt User to allow Remote Session.
  4. Enable Allow User to disconnect Remote Shadowing.
  5. Disable Allow Input from Remote.

What port does RealVNC use? ›

By default, VNC Connect uses port 5900 TCP/UDP, so you must allow this port inbound to VNC Server and/or outbound from VNC Viewer.

Is there a 512 bit encryption? ›

The efficient hardware that implements the algorithm is also proposed. The new algorithm (AES-512) uses input block size and key size of 512-bits which makes it more resistant to cryptanalysis with tolerated area increase.

How long does it take to crack 256-bit key? ›

Is AES-256 Encryption Crackable? AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities.

How long is 256-bit encryption key? ›

The 256-bit keys are the longest allowed by AES. By default, IBM Security Guardium Key Lifecycle Manager generates 256-bit AES keys. Asymmetric, or public/private encryption, uses a pair of keys. Data encrypted using one key can only be decrypted by using the other key in the public/private key pair.

How long is 256-bit encryption password? ›

In general, longer passwords are more secure than shorter passwords. In fact, taking maximum advantage of the full strength of AES encryption requires a password of approximately 32 characters for 128-bit encryption and 64 characters for 256-bit encryption.

What is the hardest encryption to hack? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

Can hackers break AES 256? ›

AES-256 is unbreakable by brute force

Data protected by AES 256 is unbreakable by brute force. It is the strongest encryption and is almost impossible to break. A brute force attack is when a hacker checks different key combinations until he/she arrives at the correct combination.

What is 4096 bit encryption? ›

RSA-4096 is a legitimate encryption cipher. It is one of the best encryption systems that you can use to protect your data in transmission. But, unfortunately, a system that is universally available can be used by miscreants as well as honest business people.

Can quantum computers break AES 256? ›

AES 256 is Quantum-Resistant, Capable of Withstanding Brute-Force Attack By QuSecure, Inc. The National Institute of Standards and Technology (NIST) has yet to announce its final list of post-quantum security algorithms and encryption schemes designed to resist quantum computer attacks.

Does Bitcoin use 256-bit encryption? ›

The Bitcoin protocol mainly uses SHA-256 for all hashing operations. Most importantly, hashing is used to implement Bitcoin's Proof-of-Work mechanism.

Is decrypting a 256-bit key impossible? ›

256-bit encryption is refers to the length of the encryption key used to encrypt a data stream or file. A hacker or cracker will require 2256 different combinations to break a 256-bit encrypted message, which is virtually impossible to be broken by even the fastest computers.

Can VNC server be hacked? ›

Using TightVNC as with default settings can pose a security threat even without any attacker just capturing the network traffic. If the device is used to access another machine through TightVNC the credentials can be compromised.

Can VNC be used to spy? ›

New Android Malware Uses VNC to Spy and Steal Passwords from Victims. A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud.

What is VNC vulnerability? ›

Improper Authentication vulnerability in B&R Industrial Automation B&R VC4 (VNC-Server modules). This vulnerability may allow an unauthenticated network-based attacker to bypass the authentication mechanism of the VC4 visualization on affected devices.

Why not to use VNC? ›

Because it is ubiquitous and powerful, VNC has had several vulnerabilities exposed. The BleepingComputer link below lists 37 such vulnerabilities, affecting four VNC products. Most of these allow an attacker to execute code on the remote computer.

How is VNC different from remote desktop? ›

Both protocols provide access to remote desktops for quick and easy remote working and troubleshooting. The main difference is that RDP is a virtual session and VNC captures the physical display; you see exactly what the remote user sees.

Is remote desktop encrypted by default? ›

The short answer to, “Is RDP encrypted?” is yes – but that comes with a big caveat. By default, Impero and other remote desktop service providers also create remote connections that are encrypted at the highest possible level.

Is there anything better than VNC? ›

RDP is far more secure than VNC. RDP has limited platform accessibility, but VNC works cross-platform. RDP connects to a shared server, but VNC connects directly to a computer. RDP cannot be used if you need a remote desktop solution across multiple devices.

Is Google remote better than VNC? ›

VNC is way faster and has more features than Chrome Remote Desktop. View full answer Helpful? The best part is that [the] VNC Connect application supports multi-platform compatibility with Windows and Linux systems.

Is VNC Hipaa compliant? ›

VNC® Connect is HIPAA compliant – find out more.

How do I know if someone is connected to VNC? ›

You can use netstat to see if there is an established connection on the port your VNC server is listening on. try netstat -an | find "ESTABLISHED" | find ":5900" on Windows at the command prompt. There'll be a line entry for it if someone is connected.

Is VNC as secure as SSH? ›

You should then be able to work on the remote desktop, using VNC, thanks to SSH. Not only is your VNC connection good to go, but it's also more secure than if you had simply used the default VNC port.

Why VNC authentication failed? ›

The user you are authenticating as has not been granted the required logon types. VNC Server authenticates uses by using the Network logon type. If the user you are authenticating as is not allowed to log on to the computer with a Network logon, you will see this error.

Does RealVNC work over the Internet? ›

Yes, if you have a Home or Professional subscription. Both endpoints (that is, the remote computer you want to control, and the device you're sitting in front of and want to control from) need to be connected to the Internet, and able to communicate with RealVNC services.

Who owns RealVNC? ›

Andy Harter and other members of the original VNC team at AT&T founded RealVNC Limited in 2002.

How does RealVNC work? ›

It's a simple yet powerful protocol invented by RealVNC. VNC Server captures the desktop of the computer in real-time and sends it to VNC Viewer for display. VNC Viewer gathers your input (mouse, keyboard, or touch) and sends it for VNC Server to inject and actually achieve remote control.

Is 128-bit encryption hackable? ›

A machine that can crack a DES key in a second would take 149 trillion years to crack a 128-bit AES key. Hence, it is safe to say that AES-128 encryption is safe against brute-force attacks. AES has never been cracked yet and it would take large amounts of computational power to crack this key.

What is the most widely used encryption standard? ›

AES has become the most popular algorithm used in symmetric key cryptography. The transparent selection process established by NIST helped create a high level of confidence in AES among security and cryptography experts.

How long to crack 512-bit encryption? ›

Andrew Swallow. > > 2003 ("within three years") a 512-bit key can be factored in a few days. > this latter case, you are still looking at 2-3 years to crack the key. key may be broken in a day.

How long does it take to crack 4096 bit encryption? ›

For concreteness, in the following we consider even larger keys, of size 4096 bit (and 2048-bit primes), which should be secure beyond the year 2031 [BBB+12]. We show an attack that can extract whole 4096-bit RSA keys within about one hour using just the acoustic emanations from the target machine.

How hard is it to break encryption? ›

Many modern encryption algorithms have been battle tested (sometimes for decades) with no known vulnerabilities. This, however, does not mean that such encryption cannot be broken. Breaking encryption with no known flaws is a bit like guessing a password. If you guess enough times, you will eventually get it right.

Can quantum computers break AES 128? ›

Any system using public-key encryption will be vulnerable to an attack by a quantum computer and systems using certain types of AES, such as AES-128, must double their current key length to be remain secure. This would drive the time required to break AES encryption up to 2.29*10^32 years.

What is the longest encryption key? ›

Advanced Encryption Standard (AES) keys are symmetric keys that can be three different key lengths (128, 192, or 256 bits). AES is the encryption standard that is recognized and recommended by the US government. The 256-bit keys are the longest allowed by AES.

How long does BitLocker take to encrypt 2tb? ›

So how long will encryption take?
500 GB drive17 hours
1 TB drive33 hours
2 Tb drive67 hours

What is the best encryption key length? ›

They define the relative protection provided by different types of algorithms in “bits of security.” NIST recommends the use of keys with a minimum strength of 112 bits of security to protect data until 2030, and 128 bits of security thereafter. A 2048-bit RSA key provides 112-bit of security.

How long does it take to break 1024 bit encryption? ›

Assuming they used the General number field sieve (a very fair assumption) it would take them 7481 years to crack a 1024 bit number using the same hardware. Or using only your i7 with this algorithm: about 3 million years.

How long would it take to crack 128-bit AES encryption? ›

The EE Times points out that even using a supercomputer, a “brute force” attack would take one billion years to crack AES 128-bit encryption.

How long is the IV in AES 256 encryption? ›

The AES algorithm requires that the IV size must be 16 bytes (128 bits).

Is 128-bit encryption good enough? ›

A 128-bit level of encryption has 2128 possible key combinations. AES is by far the most advanced encryption trusted by organizations worldwide. AES-128 is strong enough to meet future security needs.

Can I trust 256-bit encryption? ›

256-bit encryption is a data/file encryption technique that uses a 256-bit key to encrypt and decrypt data or files. It is one of the most secure encryption methods after 128- and 192-bit encryption, and is used in most modern encryption algorithms, protocols and technologies including AES and SSL.

What the advantage is of using 128-bit or 256-bit data encryption rather than 56 bit encryption? ›

The main benefit of AES lies in its key length options. The time required to crack an encryption algorithm is directly related to the length of the key used to secure the communication -- 128-bit, 192-bit or 256-bit keys. Therefore, AES is exponentially stronger than the 56-bit key of DES.

Is a 256-bit encryption key more secure than a 128-bit key? ›

The “bit” refers to the length of the key required to cipher and decipher the ciphertext. This means AES 256-bit is more encrypted than its 128-bit counterpart. The 128-bit encryption alone would take billions of years for a supercomputer to crack, so the AES 256-bit is practically impenetrable.

Is there 512 bit encryption? ›

The efficient hardware that implements the algorithm is also proposed. The new algorithm (AES-512) uses input block size and key size of 512-bits which makes it more resistant to cryptanalysis with tolerated area increase.

How long to crack AES 256? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities. However, no encryption standard or system is completely secure.

How long to crack AES 128 encryption? ›

The EE Times points out that even using a supercomputer, a “brute force” attack would take one billion years to crack AES 128-bit encryption.

What is the strongest encryption? ›

The algorithm provides 128-bit block encryption and has been designed to supports key sizes of 128, 192 and 256 bits. AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

How long would it take to crack 512 bit encryption? ›

Andrew Swallow. > > 2003 ("within three years") a 512-bit key can be factored in a few days. > this latter case, you are still looking at 2-3 years to crack the key. key may be broken in a day.

Is there anything higher than 256-bit encryption? ›

Key Size: 256-bit vs 192-bit vs 128-bit

There are three different sizes: 256-bit AES, 192-bit AES and 128-bit AES. The largest size, 256-bit AES, is the most secure, while 128-bit is conversely the least secure of the three.

Is 128-bit encryption unbreakable? ›

It is one of the most secure encryption methods used in most modern encryption algorithms and technologies. 128-bit encryption is considered to be logically unbreakable.

Who uses 128-bit encryption? ›

Because of that, 128-bit encryption is commonly used for online banking, e-commerce transactions, and communication between devices. It provides a high level of security and is considered to be very difficult to crack, even by advanced hackers using powerful computers and sophisticated software.

Does key size matter in encryption? ›

Different ciphers may require different key lengths to achieve the same level of encryption strength. The RSA cipher used for public-key encryption, for example, can use only a subset of all possible values for a key of a given length, due to the nature of the mathematical problem on which it is based.

How do I know if my computer has 128-bit encryption? ›

How can I check if my browser uses 128-bit encryption?
  1. Move your mouse over the 'security lock icon' at the bottom-right corner. A tool-tip of "SSL secured (128-bit)" should pop up if you are connected using 128 Bit SSL; OR.
  2. From the 'File' menu in the toolbar, select 'Properties'.

Top Articles
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 6027

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.