How secure is AES against brute force attacks?
Mohit Arora, Sr. Systems Engineer & Security Architect, Freescale Semiconductor
EETimes (5/7/2012 1:29 PM EDT)
In the world of embedded and computer security, one of the often debated topics is whether 128-bit symmetric key, used for AES (Advanced Encryption Standard) is computationally secure against brute-force attack. Governments and businesses place a great deal of faith in the belief that AES is so secure that its security key can never be broken, despite some of the inherent flaws in AES.
This article describes the strength of the cryptographic system against brute force attacks with different key sizes and the time it takes to successfully mount a brute force attack factoring future advancements in processing speeds.
To read the full article, click here
Related Semiconductor IP
- AES
- AES
- AES GCM IP Core
- NIST AES Key Wrap/Unwrap Core
- Ultra-Compact Advanced Encryption Standard (AES, FIPS-197) Core
Related White Papers
- Secure Your Security Key in On-Chip SRAM: Techniques to avoid Data Remanance Attacks
- How to select an AES solution
- How to defend against the cloning of your FPGA designs
- How productive is your R&D organization?
Latest White Papers
- Ramping Up Open-Source RISC-V Cores: Assessing the Energy Efficiency of Superscalar, Out-of-Order Execution
- Transition Fixes in 3nm Multi-Voltage SoC Design
- CXL Topology-Aware and Expander-Driven Prefetching: Unlocking SSD Performance
- Breaking the Memory Bandwidth Boundary. GDDR7 IP Design Challenges & Solutions
- Automating NoC Design to Tackle Rising SoC Complexity