Tag: aes

9 How to calculate an IV when I have a shared private key? 2012-03-23T14:59:36.060

9 How were the AES key and block length subsets of Rijndael selected? 2012-05-11T18:35:56.327

9 How were the number of rounds for different key sizes of AES selected? 2012-05-21T14:34:13.393

9 On-the-fly computation of AES Round Keys for decryption? 2012-12-06T22:34:38.307

9 Should I salt an AES password at each encryption? 2012-12-31T14:39:26.107

9 AES plaintext is smaller than 128 bits - how to expand? 2013-04-25T14:27:24.423

9 AES encryption using a Diffie-Hellman key exchange 2013-07-31T13:27:44.147

9 Efficient AES - Use of T-tables 2014-09-16T20:07:16.913

9 AES GCM vs other encryption modes in embedded environment for network traffic 2015-02-24T08:27:30.180

9 What does a stream cipher provide that cannot be obtained with AES CTR mode operation? 2015-05-26T19:20:14.477

9 Is there any reason not to use Single-Key EM with AES and a constant key? 2015-11-01T14:18:24.147

9 Why is AES-SIV not used, but AESKW, AKW1? 2016-01-10T22:34:29.183

9 Nonce encryption with Poly1305-Chacha20 2016-04-11T18:59:17.450

9 Does changing the order of the steps within a round affect the security of AES? 2016-06-27T10:01:16.327

9 How does AES introduce confusion and diffusion? 2016-10-13T19:38:27.037

9 Can Whirlpool take advantage of AES-NI? 2016-11-10T09:52:30.870

9 What is the correct way to implement PBKDF2 + AES CBC + HMAC? 2017-04-27T00:50:23.643

8 Where can I get information on how to implement AES? 2011-09-29T13:40:04.090

8 Does AES-CTR require an IV for any purpose other than distinguishing identical inputs? 2012-01-03T23:36:18.827

8 Does encrypting twice using the same block cipher produce a security weakness? 2012-04-09T12:44:20.813

8 How to use RCON In Key Expansion of 128 Bit Advanced Encryption Standard 2012-04-21T13:52:16.373

8 Cipher Feedback Mode 2012-04-27T12:00:19.810

8 How does the key schedule of Rijndael looks for keysizes other than 128 bit? 2012-04-30T08:40:53.530

8 Is there a standard for OpenSSL-interoperable AES encryption? 2012-07-21T06:43:45.170

8 AES timing attacks 2012-11-29T17:43:34.623

8 Is AES-XTS considered safe to encrypt multiple files with the same keys? 2013-08-05T16:01:38.720

8 Will our app be FIPS 140-2 compliant if we use our own AES algorithm implementation? 2013-08-21T15:18:36.700

8 How long does it take a quantum computer to brute force AES? 2013-10-12T22:39:00.610

8 Why does OpenSSL append extra bytes when encrypting with aes-128-ecb? 2013-12-27T21:19:06.573

8 At what stage is DHE and RSA used during the SSL/TLS handshake? 2014-01-05T14:52:24.677

8 Leaving authentication data blank less secure for AES GCM? 2014-04-21T18:14:47.250

8 Why is the polynomial in AES MixColumns multiplied modulo a reducible polynomial? 2014-04-27T16:13:01.867

8 Rely on NSA Suite B Cryptography? 2014-08-16T12:38:31.573

8 How exactly does AES-NI work? 2014-10-08T20:06:57.270

8 Switching between AES and a highly performant algorithm 2015-09-18T07:29:45.840

8 Branchless AES Implementation 2015-11-17T22:21:02.703

8 Side channel security of HMAC in software 2016-01-30T11:15:15.677

8 AES key reuse and guessing the key 2016-03-16T08:25:35.913

8 One way function built from AES? 2016-12-05T19:07:36.197

8 Why are side channel attacks such as SPA/DPA/ CPA based on the AES SubBytes routine? 2016-12-27T14:06:53.723

8 How to detect duplicate values of sensitive data that needs to be encrypted 2017-01-05T01:32:25.083

8 Advantage of $\operatorname{GF}(2^8)$ over $\mathbb Z/2^8\mathbb Z$ in AES/Rijndael 2017-01-07T14:59:08.597

8 Chosen Plaintext attack on AES in ECB mode 2017-01-10T11:41:23.113

8 AES Decryption followed by Encryption, will it produce the original text? 2017-03-26T06:57:50.807

8 Is ChaCha20 safer than AES with respect to side-channel attacks? 2017-06-13T21:25:02.497

8 RSA4096 vs AES256 for secure Chat application? 2017-07-01T08:45:55.957

8 What are the implications of a non “constant time” implementations on trusted systems in a non-network scenario? 2017-10-18T12:20:24.973

8 AES-128. Do there exist two different keys for a pair (text, encrypted text)? 2017-11-04T20:26:42.110

8 Hardware AES: can we have a decryption implementation only? 2018-09-07T09:33:36.267

8 AES and DES - reusing the same round keys 2018-11-01T11:37:15.720

7 Encrypted text length in AES 2011-07-16T16:42:22.577

7 How to enhance randomness of AES? 2011-09-28T16:47:42.147

7 Is the AES Key Schedule weak? 2012-01-20T17:58:40.203

7 Rijndael vs. Serpent vs. Twofish: General comparison 2012-02-20T07:31:19.730

7 Does AES specify error messages when using the wrong password to decrypt? 2012-03-30T11:57:01.790

7 CBC key lifetime, or, "how big is too big?" 2012-04-26T14:24:50.973

7 Advantage of AES(Rijndael) over Twofish and Serpent 2012-11-07T15:57:06.803

7 Is storing the hash of a key together with ciphertext encrypted with that key secure? 2012-11-20T22:31:35.837

7 What is 'security margin'? 2013-02-08T11:28:40.577

7 AES-SIV security 2013-07-12T18:45:03.237

7 AES 256 Encryption - Is it really easy to decrypt if you have the key? 2013-07-17T09:56:21.567

7 What's the most secure way to derive a key from a password repeatably? 2013-07-20T19:55:09.677

7 Does the GCM authentication tag need to be protected? 2013-07-29T15:02:49.097

7 AES key expansion: 256bit key 2013-08-04T09:38:15.513

7 Vulnerabilities if encrypting the same data with 2 different keys 2013-08-14T17:20:15.187

7 Multiple iterations of AES for key derivation? 2013-08-28T03:58:28.163

7 What is the security loss from reducing Rijndael to 128 bits block size from 256 bits? 2013-09-23T06:33:45.237

7 How to break AES/CBC/PKCS5 when key and IV are reused? 2013-11-21T16:45:49.467

7 How to obtain KCV from the key 2013-11-22T14:17:24.240

7 Is AES still secure considering all this NSA/Snowden scandal? 2013-12-16T15:57:45.173

7 What characters does AES output? 2013-12-27T22:52:13.480

7 AES mixcolumn stage 2014-01-12T16:59:08.343

7 Is it secure to derive an AES key from a MAC? 2014-08-22T08:19:24.847

7 How to protect key in software 2015-10-09T09:07:08.753

7 For a given plaintext-ciphertext pair, how many valid AES keys are there? 2015-11-06T14:19:55.720

7 Applicability of birthday attack to AES brute force 2016-02-26T02:38:01.480

7 AES sbox security issue - power analysis attack? 2016-07-13T09:00:43.797

7 Does EAX require padding to be secure? 2016-08-17T08:31:44.390

7 Detection of weak keys for AES-GCM 2016-08-26T12:05:59.987

7 Why should we consider the output of the AES s-box as a “sensitive value” in relation to side channel attacks? 2016-08-29T09:19:51.720

7 Should I use “modes of operation” for a single block of data? 2016-12-13T15:08:58.197

7 Is it safe to encrypt a part of the message with RSA and the rest with AES? 2016-12-21T08:26:14.873

7 How to check that AES Matrix is MDS? 2017-02-22T16:34:30.730

7 What is a safe maximum message size limit when encrypting files to disk with AES-GCM before the need to re-generate the key or NONCE 2017-02-22T23:01:08.320

7 Is it necessary for the Rijndael polynomial to be primitive? 2017-03-04T18:53:26.240

7 Implement AES-CTR on top of AES-ECB 2017-03-11T23:12:09.000

7 What size of initialization vector (IV) is needed for AES encryption? 2017-08-11T17:31:09.747

7 Why is x^8 + x^4 + x^3 + x + 1 used in AES's Rcon? 2017-09-27T10:38:09.327

7 When will AES be "upgraded"? 2017-11-11T03:57:15.947

7 Is it safe to store both the AES-related data and the PBKDF2-related data (except passwords) in one file? 2017-11-13T17:59:55.460

7 Is the cipher "Kalyna" with a 512-bit key length more secure AES with a 256-bit key? 2018-04-29T17:45:32.120

7 TLS 1.2 Cipher Suites With AES-GCM – What data (if any) is passed to the AES-GCM cipher as the Additional Authentication Data? 2018-05-31T18:03:15.393

7 Can I hash a secret key and used the hash as key ID? 2018-08-31T01:10:50.677

7 Who said "32 round Rijndael" in the third AES Conference 2018-11-12T19:28:30.043

6 Is it safe to encrypt a public key alongside a message with AES? 2011-08-24T01:10:09.027

6 What causes first block of AES decryption to be garbled, even with correct IV? 2011-09-15T17:28:20.637

6 Is it safe to store initial counter value for AES-CTR alongside with ciphertext? 2011-12-09T14:22:56.973

6 Does the Biclique attack on AES pose a credible risk to its security? 2012-04-21T17:05:45.320

6 Which of these 3 AES 128 symmetric encrypt/decrypt routines is most secure? 2012-07-10T21:24:46.823