Linked by David Adams on Wed 17th Aug 2011 17:53 UTC, submitted by HAL2001
Privacy, Security, Encryption Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. In the last decade, many researchers have tested the security of the AES algorithm, but no flaws were found so far. The new attack applies to all versions of AES even if it used with a single key. The attack shows that finding the key of AES is four times easier than previously believed; in other words, AES-128 is more like AES-126.
Permalink for comment 485656
To read all comments associated with this story, please click here.
RE[6]: AES-254
by Morgan on Thu 18th Aug 2011 00:00 UTC in reply to "RE[5]: AES-254"
Morgan
Member since:
2005-06-29

How about "impossible within the natural lifespan of all currently living humans and their great*10^18 offspring"? That's my take on it.

After all, I doubt any humans would be left alive 70 quadrillion years from now to care what the encrypted data was. Even if there were, the computer being used to crack it would likely disintegrate completely a few hundred million years into the process.

So, yeah, "impossible" is, for all intents and purposes, a practical description.


Edit: And yes, I know galvanash's white paper called for 77 septillion years, but I was attempting to stay within the lifespan of the universe, give or take an order of magnitude.

Edited 2011-08-18 00:04 UTC

Reply Parent Score: 2