How secure is AES against brute force attacks?
Mohit Arora, Sr. Systems Engineer & Security Architect, Freescale Semiconductor
EETimes (5/7/2012 1:29 PM EDT)
In the world of embedded and computer security, one of the often debated topics is whether 128-bit symmetric key, used for AES (Advanced Encryption Standard) is computationally secure against brute-force attack. Governments and businesses place a great deal of faith in the belief that AES is so secure that its security key can never be broken, despite some of the inherent flaws in AES.
This article describes the strength of the cryptographic system against brute force attacks with different key sizes and the time it takes to successfully mount a brute force attack factoring future advancements in processing speeds.
To read the full article, click here
Related Semiconductor IP
- AES
- AES
- AES GCM IP Core
- AES-SX-GCM-XTS-up Secure Core - AES Encryption Core with Extreme SCA Protection for Ultra-High-Security Applications
- AES-SX-GCM-XTS Secure Core - High-Performance AES Encryption Core with GCM/XTS Support and Advanced SCA/FI Protection
Related Articles
- Secure Your Security Key in On-Chip SRAM: Techniques to avoid Data Remanance Attacks
- How productive is your R&D organization?
- What! How big did you say that FPGA is? (Team-design for FPGAs)
- How to design secure USB-based dongles
Latest Articles
- FPGA-Accelerated RISC-V ISA Extensions for Efficient Neural Network Inference on Edge Devices
- MultiVic: A Time-Predictable RISC-V Multi-Core Processor Optimized for Neural Network Inference
- AnaFlow: Agentic LLM-based Workflow for Reasoning-Driven Explainable and Sample-Efficient Analog Circuit Sizing
- FeNN-DMA: A RISC-V SoC for SNN acceleration
- Multimodal Chip Physical Design Engineer Assistant