Changes

Extending AES-128 Attacks to AES-256

21 bytes added, 20:43, 25 March 2017
no edit summary
# Reverse the 13th and 14th round keys using the AES-256 key schedule to determine the 256 bit secret encryption key.
Once this is done, we have successfully attacked an AES-256 implementation by looking at two separate AES S-boxes.
 
[[Category:Theory]]
Approved_users, bureaucrat, administrator
1,956
edits