| Welcome to Crypto. We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| Cracking AES | |
|---|---|
| Tweet Topic Started: Jun 22 2013, 08:29 AM (294 Views) | |
| coder | Jun 22 2013, 08:29 AM Post #1 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
A better mousetrap is under way to crack AES -- power consumption enormous at 200 megawatts. |
| quot homines tot sententić | |
![]() |
|
| mok-kong shen | Jun 22 2013, 10:09 AM Post #2 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
It's nice that you provide us the link. In my humble view the really good way of ensuring a good block cipher of the typical (common type of) design against brute-forcing is: (1) Employ sufficiently large key size, e.g. 512 bits, if available, or (2) Introduce appropriate dynamics/variability in its use (I suggested long ago elsewhere the use of dynamically varying keys). |
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · News · Next Topic » |





![]](http://z2.ifrm.com/static/1/pip_r.png)



12:14 AM Jul 11