About 66 results
Open links in new tab
  1. How is AES-128 still considered to be quantum resistant?

    Oct 6, 2024 · AES-128 if cracked using quantum computer, Grover’s algorithm will make it $2^{64}$ computations to complete. The fastest non-quantum classical super computer can run approximately …

  2. How long would it take to brute force an AES-128 key?

    Jun 27, 2017 · How long would it take to crack a AES-128 key using the most advanced technology currently available? The hardware can be anything, be it a high-performance CPU, GPU or even …

  3. What are the practical differences between 256-bit, 192-bit, and 128 ...

    Oct 15, 2011 · The larger key sizes imply some CPU overhead (+20% for a 192-bit key, +40% for a 256-bit key: internally, the AES is a sequence of "rounds" and the AES standard says that there shall be …

  4. How to choose between AES-CCM and AES-GCM for storage volume …

    Mar 27, 2013 · How to choose between AES-CCM and AES-GCM for storage volume encryption Ask Question Asked 12 years, 9 months ago Modified 4 years, 10 months ago

  5. How weak is using AES with a 128 bit key but 64 bits of the secret key ...

    Oct 7, 2023 · Respected community, I was wondering how weak would AES-128 be, if we provide only a 64 bit key with the other remaining 64 bits either zero bits or public constants, known to the attacker. …

  6. aes gcm - Why GCM operation mode with AES-128 is recomended and …

    It happens that on the internet I often find that AES encryption should use a 128-bit key only if it is used in conjunction with the GCM mode of operation. Why only with 128-bit keys? What happen...

  7. Demystifying Schannel | Microsoft Community Hub

    Sep 20, 2018 · While all of the options above are available to the operating systems and Schannel, they are not offered up in an a-la carte manner. Each Windows operating system maintains a pre-defined …

  8. Is AES-128 quantum safe? - Cryptography Stack Exchange

    Nov 10, 2022 · The most dangerous attack against AES-128 is the multi-target attack. Also, Squamish gave a calculation about the sequential calls of Grovers with an indication that the setup time is not …

  9. Active Directory Hardening Series - Part 4 – Enforcing AES for Kerberos ...

    Apr 15, 2024 · Hi everyone, Jerry Devore here again with another installment in my series on Active Directory hardening. This time I want to revisit a topic I previously wrote about in September of 2020 …

  10. AES-128 ECB Standard Confusion - Cryptography Stack Exchange

    Mar 8, 2024 · Forgive my ignorance, but I've run into some confusion in an AES implementation I'm testing. To the best of my understanding, ECB provides no diffusion, the same plaintext with the …