[144685] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: New Attacks against AES-256

daemon@ATHENA.MIT.EDU (Robert Holmes)
Mon Aug 3 17:57:58 2009

Date: Mon, 03 Aug 2009 22:09:07 +0100
From: Robert Holmes <robeholmes@gmail.com>
To: "I)ruid" <druid@caughq.org>
CC: cryptography@metzdowd.com
In-Reply-To: <1249324730.3270.149.camel@localhost>

I)ruid wrote:
> Paper and details are not yet public, but Schneier provides a summary:
>
> http://www.schneier.com/blog/archives/2009/07/another_new_aes.html
>
> Basically, if AES-256 is implemented with fewer rounds than the standard
> specifies (essentially the number of rounds recommended for AES-128), it
> is susceptible to a number of related-key attacks.
>
>   
Paper and details are now public --- http://eprint.iacr.org/2009/374


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post