(no title)
mcint | 1 year ago
It ignores the requirement that secret data needs to stay secret for 30 years, or 100 years, or long into the future, and attacks only get better.
https://www.schneier.com/blog/archives/2009/07/another_new_a...
> They also describe an attack against 11-round AES-256 that requires 2^70 time—almost practical.
>> AES is the best known and most widely used block cipher. Its three versions (AES-128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively).
>> In the case of AES-128, there is no known attack which is faster than the 2^128 complexity of exhaustive search. However, AES-192 and AES-256 were recently shown to be breakable by attacks which require 2^176 and 2^119 time, respectively.
vitus|1 year ago
(Note that the attack with time complexity 2^99.5 also requires 77 bits of memory, or ~16 ZiB, which is, um, billions of terabytes of RAM? edit: actually, this is 2^77 blocks worth of memory, so add a couple more orders of magnitude.)
To date, the best unconditional attack on any full variant of AES provides a factor of ~4 speedup, although it requires 9 PB of data just for AES-128.
bawolff|1 year ago
What data has to stay secret for 100 years?
To extrapolate backwards, was there anything in 1925 that would be still sensitive today? Its hard to imagine.
Jedd|1 year ago
The fact you don't know about these might in fact simply indicate the efficacy of the secret keepers.
rocqua|1 year ago
There is plenty of reason to want to keep diplomatic and military communications secret for a long time.
hatsunearu|1 year ago
ziofill|1 year ago
dcow|1 year ago