Tag: aes

74 Is AES-256 weaker than 192 and 128 bit versions? 2012-10-19T22:02:16.503

68 What are the practical differences between 256-bit, 192-bit, and 128-bit AES encryption? 2011-07-12T19:44:46.490

62 How secure is AES-256? 2012-04-01T16:15:54.610

62 What is the difference between PKCS#5 padding and PKCS#7 padding 2013-07-04T21:18:51.007

44 What is safer: ZipCrypto or AES-256? 2012-09-13T13:55:27.977

37 Why is AES resistant to known-plaintext attacks? 2011-12-20T20:03:16.320

37 What are the chances that AES-256 encryption is cracked? 2017-04-12T23:22:41.113

36 Why does nobody use (or break) the Camellia Cipher? 2011-08-20T00:37:38.587

30 Dropbox Password security 2016-12-19T19:05:16.800

29 Why should I use an Initialization Vector (IV) when I have unique keys? 2013-06-06T02:38:20.913

28 Why do wireless keyboards only use 128-bit AES? Why not 256? 2017-09-13T19:25:25.630

28 Why was AES CBC removed in TLS 1.3? 2017-10-26T15:10:49.513

26 What is the effect of the different AES key lengths? 2012-08-23T15:57:50.073

26 Assuming a 1024qb quantum computer, how long to brute force 1024bit RSA, 256bit AES and 512bit SHA512 2013-07-30T00:02:34.347

26 AES256-GCM - can someone explain how to use it securely (ruby) 2014-07-03T22:19:59.007

25 AES CBC mode or AES CTR mode recommended? 2013-01-19T12:02:07.003

23 Blum Blum Shub vs. AES-CTR or other CSPRNGs 2012-08-03T18:20:34.213

21 Known methods for constant time (table-free) AES implementation using 'standard' operations? 2011-07-12T23:03:57.807

21 Why is MixColumns omitted from the last round of AES? 2011-11-28T23:10:54.990

21 Is AES-256 a post-quantum secure cipher or not? 2013-03-16T15:28:02.743

21 Is GCM still recommended? 2016-04-11T14:13:16.417

20 How long does it take to crack DES and AES? 2011-09-23T05:29:07.533

20 Choice of multiplication polynomial in Rijndael s-box affine mapping 2014-06-29T12:29:15.470

18 Design properties of the Rijndael finite field? 2011-07-26T17:05:14.267

18 Difference between Rijndael 128 / 256 blocksize implementations? (and impact of block size in general) 2013-01-17T15:41:49.920

18 Is there a key for AES-128, 256 etc, where cleartext equals ciphertext? 2016-04-12T17:41:11.150

18 Isn't AES-NI useless because now the key length need to be longer? 2016-11-10T14:24:50.397

17 How to solve MixColumns 2012-04-19T17:04:49.063

17 Is AES in CBC mode secure if a known and/or fixed IV is used? 2012-10-18T16:07:39.107

17 How to choose between AES-CCM and AES-GCM for storage volume encryption 2013-03-27T12:00:59.903

17 How exactly was the finalist chosen in the NIST AES competition? 2013-10-17T02:59:46.093

17 Ciphertext and tag size and IV transmission with AES in GCM mode 2015-07-07T20:41:02.443

17 Plain text size limits for AES-GCM mode just 64GB? 2016-01-08T19:44:02.827

16 Related-key attacks on AES 2011-12-30T23:35:09.150

16 Why is OCB-AES mode not becoming a standard for authenticated encryption? 2012-12-09T13:41:24.100

16 Why exactly is Blowfish faster than AES? 2013-04-17T00:59:32.637

16 Is there an AES identity key? 2016-02-23T13:05:06.243

16 Does AAD make GCM encryption more secure? 2016-05-31T04:52:22.280

16 Is password-based AES encryption secure at all? 2016-12-25T18:50:43.433

15 Are AES-256's related-key weaknesses exploitable if it is used to build a hash? 2014-04-14T10:21:07.897

15 Why we can't implement AES 512 key size? 2014-11-14T16:59:18.020

15 AES - What is the advantage of a 256-bit key with a 128-bit block cipher? 2015-12-22T19:52:47.000

15 Is it possible to utilize an AES-128 encryption hardware unit for AES-256? 2016-04-08T18:43:48.947

15 Why would anyone choose 3DES over AES in software? 2018-08-07T18:24:11.797

15 Is AES easier to crack when the input is small? 2018-09-11T12:58:45.830

14 Is CBC really dead? 2011-09-27T22:17:46.387

14 AES in ECB mode weakness 2011-10-14T10:26:23.447

14 Does AES have any fixed-points? 2011-10-15T00:55:36.407

14 Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair? 2012-10-04T08:17:33.733

14 Can AES decryption be used as encryption? 2013-08-10T06:18:14.947

14 Why was the winner of the AES competition not a Feistel cipher? 2013-09-29T17:23:23.367

14 Calculate all possible keys for AES 128 encryption to exploit hardware encryption 2018-08-27T14:41:41.083

13 Replacing the Rijndael S-Box? 2011-07-13T17:42:19.290

13 Is it possible to distinguish a securely-encrypted ciphertext from random noise? 2012-01-12T12:19:41.650

13 Why is AES considered to be secure? 2013-09-20T13:34:28.030

13 Why is AES not a Feistel cipher? 2013-09-28T04:20:19.267

13 How are the AES S-Boxes calculated? 2013-10-13T00:59:07.403

13 What is wrong with AES-CTR-HMAC-SHA256 - or why is it not in TLS? 2013-10-26T20:39:02.340

13 Twofish vs. Serpent vs. AES (or a combo) 2015-03-01T08:40:23.873

13 Why is the permutation in AES (and other ciphers) not random or key-dependent? 2016-04-12T09:12:18.340

13 Is there any benefit from using SHA-512 over SHA-256 when AES just truncates it anyway? 2016-11-13T22:54:34.370

13 Can we prove possession of an AES-256 key without showing it? 2018-02-17T08:12:33.497

12 S-box design criteria and random sboxes 2012-07-15T15:45:22.113

12 AES-GCM and its IV/nonce value 2012-12-21T05:02:07.350

12 Encrypt-then-MAC: Do I need to authenticate the IV? 2015-03-11T13:28:34.440

12 How were the best AES whiteboxes in the CHES 2017 CTF challenge built and broken? 2017-10-28T11:54:07.470

11 Are these emerging threats against AES affecting your designs? 2011-08-17T16:44:39.757

11 How do I construct a 256-bit hash function from 128-bit AES? 2011-09-09T17:13:38.877

11 Can one claim that AES is a perfect cipher? 2011-11-27T02:06:56.503

11 How do I correctly derive a Key and IV? 2012-01-30T21:11:42.923

11 Are there any simple and yet secure encryption algorithms? 2012-06-03T19:04:01.107

11 Does the IV need to be known by AES (CBC mode)? 2013-04-08T05:27:54.577

11 Windows 8/Server 2012: Passes FIPS-140-2 despite failing AES-GCM for IV != 96 bits long? 2013-06-07T18:04:59.443

11 AES256-CBC vs AES256-CTR in SSH 2014-08-08T21:02:18.800

11 Consequences of AES without any one of its operations 2014-11-13T15:44:30.433

11 Evaluating Algebraic Complexity of a S-box 2015-02-14T16:58:57.803

11 How secure is AES-256, but with an effective key length of 56-bits? 2016-06-02T21:20:31.280

11 Where is the key in white-box AES cryptography? 2016-06-30T14:08:14.330

11 AES-GCM recommended IV size: Why 12 bytes? 2016-11-17T10:25:35.580

11 Is there any compelling or logical reason to use AES-192 over AES-128 but not use AES-256? 2017-02-01T15:27:36.723

11 Different ways/algorithms for implementing AES 2017-03-13T09:21:26.730

10 XSL on serpent and rijndael - which is most affected? 2011-07-26T17:27:55.837

10 Can one implement AES on 4-bit microcontroller? 2012-02-03T15:32:02.077

10 How do I store encrypted files on a web server and decrypt them locally? 2012-08-16T10:00:27.117

10 Relative merits of AES ECB and CBC modes for securing data at rest 2012-11-18T10:20:48.877

10 Stopping timing attacks on AES: Why is it important to prevent the OS from interrupting the AES computation? 2012-11-30T09:42:16.557

10 AES CTR with similar IVs and same key 2013-08-29T01:32:09.190

10 Reusing keys with AES-CBC 2013-09-22T05:48:45.760

10 Multiplicative inverse in $\operatorname{GF}(2^8)$? 2014-01-16T14:13:38.890

10 How secure is the AES master key if Round Keys are found 2014-03-24T14:41:01.297

10 128 bit 3DES Key and AES Key: what's the difference? 2015-03-02T08:47:36.740

10 AES Inverse Key Schedule 2015-12-22T17:56:40.050

10 How to calculate active s-boxes from branch number? 2016-06-03T17:00:49.680

10 Does AES-NI offer better side-channel protection compared to AES in software? 2017-02-04T09:55:22.023

10 Can one claim that AES has perfect secrecy for a key size and message size of 128 bits? 2017-12-20T10:52:05.467

10 AES cache-timing attacks and nonce-based operation modes 2018-02-23T10:38:42.230

10 After ECDH with Curve25519, is it pointless to use anything stronger than AES128? 2018-06-03T22:00:42.093

9 How can my application make sure the right symmetric key is used for decryption? 2011-07-28T05:44:17.283

9 Is there any open-source white-box implementation of AES or DES? 2011-07-30T14:53:06.937