Linked by David Adams on Wed 17th Aug 2011 17:53 UTC, submitted by HAL2001
Privacy, Security, Encryption Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. In the last decade, many researchers have tested the security of the AES algorithm, but no flaws were found so far. The new attack applies to all versions of AES even if it used with a single key. The attack shows that finding the key of AES is four times easier than previously believed; in other words, AES-128 is more like AES-126.
Thread beginning with comment 485568
To read all comments associated with this story, please click here.
Really new?
by zima on Wed 17th Aug 2011 18:25 UTC
Member since:

I seem to remember claims of similar attacks. Maybe with the label "possible" attached, so perhaps that's one of them, analysed better; or maybe not.

Anyway, "four times easier than anticipated by experts" is really "four times easier (faster) than via brute force" - which is still not nearly fast enough to be practical, still leaves AES rather strong.

Reply Score: 1

RE: Really new?
by vaette on Thu 18th Aug 2011 11:09 in reply to "Really new?"
vaette Member since:

It is always very relevant when any kind of new progress is made though, since any new technique often turns out to be a stepping stone (in thought if not in practice) towards more fundamental cracks.

Notably the early Slashdot reactions when MD5 was slightly weakened in a theoretical setting were rather dismissive, but the first small steps forward quickly snowballed and left MD5 severely compromised.

Reply Parent Score: 1