Mailing List Archive

new AES 256 vulnerability
a new attack has been found against AES - 256

http://www.schneier.com/blog/archives/2009/07/another_new_aes.html

it only works against 10 round AES-256 (which normally has 16
rounds)


(am not overly worried,
still use IDEA when encrypting for diehard pgp2.x e-mailers, and
that has 5 of 8 rounds broken ;-) ))

but as AES is the default gnupg block cipher of choice,
am just bringing it to people's attention here


vedaal

any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: new AES 256 vulnerability [ In reply to ]
> (am not overly worried,
> still use IDEA when encrypting for diehard pgp2.x e-mailers, and
> that has 5 of 8 rounds broken ;-) ))

6.


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: new AES 256 vulnerability [ In reply to ]
On Jul 30, 2009, at 4:17 PM, vedaal@hush.com wrote:

> a new attack has been found against AES - 256
>
> http://www.schneier.com/blog/archives/2009/07/another_new_aes.html
>
> it only works against 10 round AES-256 (which normally has 16
> rounds)

It breaks 11 rounds of 14.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: new AES 256 vulnerability [ In reply to ]
* "Robert J. Hansen" <rjh@sixdemonbag.org> wrote:

> >(am not overly worried, still use IDEA when encrypting for diehard
> >pgp2.x e-mailers, and that has 5 of 8 rounds broken ;-) ))
>
> 6.

7 - raise? fold?

--
left blank, right bald