Linked by David Adams on Wed 17th Aug 2011 17:53 UTC, submitted by HAL2001
Privacy, Security, Encryption Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. In the last decade, many researchers have tested the security of the AES algorithm, but no flaws were found so far. The new attack applies to all versions of AES even if it used with a single key. The attack shows that finding the key of AES is four times easier than previously believed; in other words, AES-128 is more like AES-126.
Permalink for comment 485730
To read all comments associated with this story, please click here.
RE[5]: AES-254
by Slambert666 on Thu 18th Aug 2011 10:35 UTC in reply to "RE[4]: AES-254"
Member since:

The assumption is that the computing power stays constant.
If computer speed doubles every 18 months then the problem can be solved in 0.01 seconds 300 years from now, given the same amount of processing power, relatively. This is not taking into account algorithmic improvements.

Just like today we find historic ciphers like the Caesar cipher laughably easy to crack, the future will find AES256 easy to crack.

Reply Parent Score: 1