Content deleted Content added
TommyGundam (talk | contribs) m →Known attacks: actually tao and wu's 2015 paper improved the time complexity from 2^126.2 to 2^126.01 on aes-128, thus adding the word "approximately" for better accuracy |
TommyGundam (talk | contribs) m →Side-channel attacks: that one is a conference paper, so it should use {{cite conference}} |
||
Line 171:
In March 2016, Ashokkumar C., Ravi Prakash Giri and Bernard Menezes presented a side-channel attack on AES implementations that can recover the complete 128-bit AES key in just 6–7 blocks of plaintext/ciphertext, which is a substantial improvement over previous works that require between 100 and a million encryptions.<ref>{{cite book |year=2016 |author1=Ashokkumar C. |title=2016 IEEE European Symposium on Security and Privacy (EuroS&P) |pages=261–275 |author2=Ravi Prakash Giri |author3=Bernard Menezes |doi=10.1109/EuroSP.2016.29 |isbn=978-1-5090-1751-5 |s2cid=11251391}}</ref> The proposed attack requires standard user privilege and key-retrieval algorithms run under a minute.
Many modern CPUs have built-in [[AES instruction set|hardware instructions for AES]], which protect against timing-related side-channel attacks.<ref>{{cite
=== Quantum attacks ===
|