• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • AES-256 Attacks Get More Sophisticated, But Security is Maintained

    August 18, 2009 Alex Woodie

    A group of respected cryptographers recently publicized details of a new attack on the AES-256 encryption algorithm that appears to be quite sophisticated. For years, hackers have used blunt-force attacks to try and crack AES-256–the strongest of the U.S. Government-sanctioned Advanced Encryption Standards–with no major progress. The new approach appears to be easy enough to use that it’s making security experts worried, but that doesn’t mean you should give up on AES-256 for your enterprise security needs just yet.

    Security expert Bruce Schneier, one of the first to alert the industry to the new cryptographic research, dubbed the attack “very impressive” and “completely practical” in his blog entry on the topic last month. “These new results greatly improve” on older attempts to crack AES-256.

    However, that doesn’t mean that AES-256 is as weak and compromised as your Facebook password just yet.

    The security experts over at Pat Townsend Security Solutions say their customers should not worry, and neither should anybody using an AES-256 solution that’s been certified by the National Institute of Standards and Technology.

    That’s because all NIST-certified encryption solutions are required to use at least 14 rounds during the encryption process. The new attack on AES-256 exploits a problem with key management that is evident when 10 or fewer rounds are employed. “There is no known practical attack on 256-bit AES encryption that implements 14 rounds,” the Pat Townsend blog says. A list of all NIST-certified encryption solutions can be found at csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html

    While it’s not time to pile into the ark just yet, the weakness in AES-256 encryption should serve as a wake-up call for the security-minded. After all, AES-256 was considered the gold standard in encryption. It had a 256-bit key, which supposedly makes it harder to crack than keys with 192-bit or a 128-bit lengths, right? As it turns out, the number of rounds the encryption engine takes could be just as important as key length, and this might encourage the NIST to increase the number of rounds required.

    The luster is off AES-256, but other, more important security vulnerabilities will undoubtedly follow. A smart security administrator will use the event as a reminder that is no single silver bullet for achieving good security. “Cryptography is all about safety margins,” Schneier writes in his blog. “What we’re learning is that the safety margin of AES is much less than previously believed.”

    Pat Townsend Security Solutions is using the episode to promote the use of trusted partners. If you went the cheap route and hacked together your own encryption routines using AES-256 or installed an open source solution, there’s a chance that work may soon be compromised by newly created attacks, the vendor writes on its blog. But if you paid for a validated solution from a vendor like PTSS, then you have less to worry about. There is some truth to that, too.

    Good security isn’t a black-or-white, on-or-off proposition, but rather an on-going process that requires continual work. Keep that in mind as you’re plugging the holes in your enterprise.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    VAULT400:  White paper: National bike retailer "rolls" with Vault400
    Raz-Lee Security:  iSecurity Compliance Evaluator: Instant network-wide compliance checks
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Q&A with TVMUG’s Don Rima Validate DBCS-Open Data

    Leave a Reply Cancel reply

Volume 9, Number 30 -- August 18, 2009
THIS ISSUE SPONSORED BY:

New Generation Software
Bytware
Profound Logic Software
Computer Keyes
East Coast Computer

Table of Contents

  • Stonebranch Bolsters i OS Support in Workload Automation Tools
  • ASTI Sees Promise in Plasmon’s UDO Technology
  • Data Control Issues Bring vLegaci QuickerApps to Market
  • Oracle Gives JDE More Supply Chain Planning Brains
  • Infor Snaps Up SoftBrands, Gets i OS-Based Hotel Suite
  • AES-256 Attacks Get More Sophisticated, But Security is Maintained
  • IdF in Reseller Deal with Dewpoint for Identity Management Software
  • Bsafe Adds AIX Support to Auditing and SIEM Product
  • Open Source Software Growing Faster Than Expected: IDC
  • Original Software Teams with AppLabs for Software Testing

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle