logo elektroda
logo elektroda
X
logo elektroda

Is the AES-256 encryption method the most secure? There are test results

danielde  Cool? (+3)

The latest results were announced last week research cryptographic files that showed threats in the method encryption AES-256 data, used in most protected internet transactions and more. AES-256 (Advanced Encryption Standard) is a symmetric block cipher used since 2002 by the American NSA to secure confidential information. Currently, the title method also protects mass storage devices, payment transactions, wireless networks, cellular network connections and a number of other applications.

AES-256 is usually based on a 256-bit encryption key (it is possible to use 128- and 192-bit keys), which can only be cracked by the so-called brute force attack. However, the number of possibilities to check - 2 ^ 256 - is greater than the number of atoms in the universe.

However, scientists say the algorithm is "unreliable" and has "certification flaws". According to them, the data encryption process does not handle certification well when the content of an encrypted message can be read in less time than checking all possible keys. However, like the alleged gaps found in AES-256 translate into online transactions? The media reports that scientists have found a way to break AES that is 3 to 5 times faster than earlier methods. At this point, it is worth mentioning that the recent attacks were part of a program implemented by Microsoft and a Belgian university famous for designing and analyzing cryptographic algorithms.

To be realistic, any attempt to decrypt information protected by AES-256 would take several times longer than the existence of the universe. So reducing this period of time by three or even five times is billions of years anyway, which is in fact an absolutely impractical solution. Even the largest botnet discovered in the world with 30 million computers would not be able to cope with an attack on AES-256 encryption.

So it can be concluded that these findings are interesting, but a lot of time and work is still needed to seriously think about the fact that AES encryption is dangerous. For now, this is it the safest information encryption method.

Source: Link

About Author
danielde wrote 671 posts with rating 30 . Live in city Bydgoszcz. Been with us since 2009 year.

Comments

^Rachel 25 Aug 2011 10:21

very interesting article. Out of curiosity, I checked 2 ^ 256 = 1.158e + 77 though I believe every cipher is crackable. [Read more]

marmon 25 Aug 2011 10:57

there is but it will take a long time, the easiest way to break a human is and this is what hacking and data theft are all about now [Read more]

Anonymous 25 Aug 2011 11:38

Ultimately, it all depends on the computing power of a given machine and on the brilliance of mind of the mathematicians who make up the breaking system. There are already methods to reduce the complexity... [Read more]

Szymon Tarnowski 25 Aug 2011 11:53

You have a calculation error, the bruteforce calculation time is calculated taking into account 50% of the checking time of all combinations. ;) Statistically NOW :D after 50% of attempts the key is ... [Read more]

nibbit 25 Aug 2011 12:12

I can not cut it, but AES did not win the competition because it was the safest (because other algorithms offered security at the same level) but because of a compromise between its security and ease of... [Read more]

Anonymous 25 Aug 2011 13:29

I wonder what the Polish VMPC cipher has to do with it, which is also said to be very resistant to attacks, and data encryption consists of just a few instructions for assembler. [Read more]

~ReverseEsper 26 Aug 2011 07:43

According to Wikipedia, the VMPC function is MOSTLY a one-way function. Until they are sure about it, they are unlikely to use the algorithm. But in fact, the implementation of the algorithm looks very... [Read more]

seba_x 26 Aug 2011 09:49

And if you are lucky, you can break the code the first time (computing), just like you can play with the totek your whole life and miss nothing, or the first time and a six at once ;-) [Read more]

tangofox 27 Aug 2011 18:01

what parts of the TCP / IP protocol does AES work on? On IP datagrams, Packets or Frames? [Read more]

fred24 19 Jan 2018 18:56

Will reheat the chop, what does this encryption look like today? has already been broken? are there any methods to decrypt aes-encrypted photos via ransomware? [Read more]

Szymon Tarnowski 18 Feb 2018 09:57

If the structure of the ransmomware is cryptographically correct (e.g. secure creation of a random key) then it cannot be broken. [Read more]

%}