ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds

Автор: Microsoft Research

Загружено: 2016-09-07

Просмотров: 2178

Описание: AES is the best known and most widely used block cipher. Its three versions (AES-128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively). In the case of AES-128, there is no known attack which is faster than the 2^{128} complexity of exhaustive search. However, AES-192 and AES-256 were recently shown to be breakable by attacks which require 2^{176} and 2^{100} time, respectively. While these complexities are much faster than exhaustive search, they are completely non-practical, and do not seem to pose any real threat to the security of AES-based systems. In this talk we describe several attacks which can break with practical complexity variants of AES-256 whose number of rounds are comparable to that of AES-128. One of our attacks uses only two related keys and 2^{39} time to recover the complete 256-bit key of a 9-round version of AES-256 (the best previous attack on this variant required 4 related keys and 2^{120} time). Another attack can break a 10 round version of AES-256 in 2^{45} time, but it uses a stronger type of related subkey attack (the best previous attack on this variant required 64 related keys by these attacks, the fact that their hybrid (which combines the smaller number of rounds from AES-128 along with the larger key size from AES-256) can be broken with such a low complexity raises serious concern about the remaining safety margin offered by the AES family of cryptosystems. This is joint work with Alex Biryukov, Nathan Keller, Dmitry Khovratovich, and Adi Shamir.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Key Recovery Attacks of Practical Complexity on AES Variants With Up To  10 Rounds

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

How Do Machines Understand Us? A History of Automatic Speech Recognition

How Do Machines Understand Us? A History of Automatic Speech Recognition

Microsoft Research Forum | Season 2, Episode 2

Microsoft Research Forum | Season 2, Episode 2

"Scientific Writing", by Prof. Michal Lipson

Tutorial Introduction to DFT (Density Functional Theory)

Tutorial Introduction to DFT (Density Functional Theory)

08 Rolandos A. Potamias – BMVA AI for Sign Language - Scaling 3D Sign Language Datasets:

08 Rolandos A. Potamias – BMVA AI for Sign Language - Scaling 3D Sign Language Datasets:

The Ridiculous Engineering Of The World's Most Important Machine

The Ridiculous Engineering Of The World's Most Important Machine

The Physicist Who Puts Penrose’s Quantum Ideas To The Test | Ivette Fuentes

The Physicist Who Puts Penrose’s Quantum Ideas To The Test | Ivette Fuentes

I Made a Classic Refactoring Mistake

I Made a Classic Refactoring Mistake

Lamport on writing

Lamport on writing "Time, Clocks, and the Ordering of Events in a Distributed System"

President Trump Holds a Press Conference, Jan. 3, 2026

President Trump Holds a Press Conference, Jan. 3, 2026

Our latest stories about China | 60 Minutes Full Episodes

Our latest stories about China | 60 Minutes Full Episodes

Искусственный интеллект пишет код лучше меня. И что теперь?

Искусственный интеллект пишет код лучше меня. И что теперь?

Expanding in three dimensions

Expanding in three dimensions

Ключевые навыки в области искусственного интеллекта к 2026 году

Ключевые навыки в области искусственного интеллекта к 2026 году

Появляется новый тип искусственного интеллекта, и он лучше, чем LLMS?

Появляется новый тип искусственного интеллекта, и он лучше, чем LLMS?

Atak na Wenezuelę. Jest oświadczenie Donalda Trump

Atak na Wenezuelę. Jest oświadczenie Donalda Trump

Riemannian Geometry - 0 - Overview and review

Riemannian Geometry - 0 - Overview and review

Ignoring All Lithium Battery Safety Warnings.. For Science!

Ignoring All Lithium Battery Safety Warnings.. For Science!

Ideas: Community building, machine learning, and the future of AI

Ideas: Community building, machine learning, and the future of AI

Richard Feynman Explains Time Like You’ve Never Seen Before

Richard Feynman Explains Time Like You’ve Never Seen Before

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]