[Cryptography] Dan Bernstein has a new blog entry on key breaking

Phillip Hallam-Baker phill at hallambaker.com
Sat Nov 21 17:15:21 EST 2015


On Sat, Nov 21, 2015 at 10:31 AM, Tamzen Cannoy <tamzen at cannoy.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Break a dozen secret keys, get a million more for free
>
> http://blog.cr.yp.to/20151120-batchattacks.html
>
> Tamzen
>
>
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Universal 3.3.0 (Build 9060)
> Charset: us-ascii
>

Oh @(@#$@#(*$%!!!!

Its obvious, isn't it. To break AES at 128 bit strength:

1) compile yourself the biggest rainbow table you can - say 2^64
plaintext, ciphertext blocks.

2) Troll through 2^64 blocks of ciphertext, looking to see if anything
becomes recognizable.

3) Repeat

Chances are that you will get a match that you can leverage further at
least 1% of the time.

So anyone using less than AES 256 is making a big mistake. In fact all
block ciphers are vulnerable to this form of meet in the middle.

@@#(@#*$(*~~~!!!!!

!


More information about the cryptography mailing list