As of August 2020 the site you are on ( is deprecated, and content is now at


Jump to: navigation, search

Extending AES-128 Attacks to AES-256

21 bytes added, 20:43, 25 March 2017
no edit summary
# Reverse the 13th and 14th round keys using the AES-256 key schedule to determine the 256 bit secret encryption key.
Once this is done, we have successfully attacked an AES-256 implementation by looking at two separate AES S-boxes.
Approved_users, bureaucrat, administrator

Navigation menu