Advertisement
nlovric

Non-dictionary known-plaintext brute force attack on AES-256

Nov 20th, 2011
908
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.21 KB | None | 0 0
  1. Maximal duration of Intel Advanced Encryption Standard (AES) New Instructions (NI) cycles in a non-dictionary known-plaintext brute force attack against a ciphertext encrypted with AES, using a 256-bit key, operating in Electronic Codebook (ECB) mode, with one million cores @ 3.1 GHz supporting Intel AES NI
  2.  
  3. Version 6, November 26, 2011
  4.  
  5. Copyleft 2011 Neven Lovriฤ‡ <[email protected]>. Released under the GNU Free Documentation License; latest version applies. Link to this page for the latest version of this table.
  6.  
  7. This was calculated with the assumption that a Cray XE6 with one million Opteron 6282 SE cores @ 3.1 GHz has equivalent computing power. May contain miscalculations.
  8.  
  9. "a-z" and "A-Z" denote the letters of the English alphabet.
  10.  
  11. Pass phrase length Possible characters Maximal duration of Intel AES NI cycles
  12.  
  13. 10 a-z ~2.55 seconds
  14. 11 a-z ~66.30 seconds
  15. 12 a-z ~28.73 minutes
  16. 13 a-z ~12.45 hours
  17. 14 a-z ~13.49 days
  18. 15 a-z ~350.68 days <-- infeasible
  19. 16 a-z ~24.96 years
  20. 17 a-z ~649.04 years
  21. 18 a-z ~16,874.96 years
  22. 19 a-z ~438,748.84 years
  23. 20 a-z ~11,407,469.74 years
  24.  
  25. 10 a-z (+ SPACE) ~3.72 seconds
  26. 11 a-z (+ SPACE) ~100.42 seconds
  27. 12 a-z (+ SPACE) ~45.19 minutes
  28. 13 a-z (+ SPACE) ~20,34 hours
  29. 14 a-z (+ SPACE) ~22.88 days
  30. 15 a-z (+ SPACE) ~1.69 years <-- infeasible
  31. 16 a-z (+ SPACE) ~45.66 years
  32. 17 a-z (+ SPACE) ~1,232.84 years
  33. 18 a-z (+ SPACE) ~33,286.65 years
  34. 19 a-z (+ SPACE) ~898,739.61 years
  35. 20 a-z (+ SPACE) ~24,265,969.60 years
  36.  
  37. 10 a-z0-9 ~66.05 seconds
  38. 11 a-z0-9 ~39.63 minutes
  39. 12 a-z0-9 ~23.78 hours
  40. 13 a-z0-9 ~35.67 days
  41. 14 a-z0-9 ~3.52 years <-- infeasible
  42. 15 a-z0-9 ~126.55 years
  43. 16 a-z0-9 ~4,555.78 years
  44. 17 a-z0-9 ~164,007.94 years
  45. 18 a-z0-9 ~5,904,285.91 years
  46. 19 a-z0-9 ~212,554,292.87 years
  47. 20 a-z0-9 ~7,651,954,543.49 years
  48.  
  49. 10 a-zA-Z ~43.52 minutes
  50. 11 a-zA-Z ~37.72 hours
  51. 12 a-zA-Z ~81.72 days <-- infeasible or
  52. 13 a-zA-Z ~11.63 years <-- infeasible
  53. 14 a-zA-Z ~605.02 years
  54. 15 a-zA-Z ~31,461.00 years
  55. 16 a-zA-Z ~1,635,971.99 years
  56. 17 a-zA-Z ~85,070,543.59 years
  57. 18 a-zA-Z ~4,423,668,266.45 years
  58. 19 a-zA-Z ~230,030,749,855.59 years
  59. 20 a-zA-Z ~11,961,598,992,490.65 years
  60.  
  61. 10 a-zA-Z0-9 ~4.21 hours
  62. 11 a-zA-Z0-9 ~10.88 days
  63. 12 a-zA-Z0-9 ~1.85 years <-- infeasible
  64. 13 a-zA-Z0-9 ~114.50 years
  65. 14 a-zA-Z0-9 ~7,099.14 years
  66. 15 a-zA-Z0-9 ~440,146.96 years
  67. 16 a-zA-Z0-9 ~27,289,111.64 years
  68. 17 a-zA-Z0-9 ~1,691,924,921.78 years
  69. 18 a-zA-Z0-9 ~104,899,345,150.51 years
  70. 19 a-zA-Z0-9 ~6,503,759,399,331.78 years
  71. 20 a-zA-Z0-9 ~403,233,082,758,570.59 years
  72.  
  73. 10 a-zA-Z0-9 (+ 22 other) ~3.66 days
  74. 11 a-zA-Z0-9 (+ 22 other) ~307.17 days <-- infeasible
  75. 12 a-zA-Z0-9 (+ 22 other) ~70.64 years
  76. 13 a-zA-Z0-9 (+ 22 other) ~5,934.08 years
  77. 14 a-ZA-Z0-9 (+ 22 other) ~498,462.36 years
  78. 15 a-zA-Z0-9 (+ 22 other) ~41,870,838.40 years
  79. 16 a-zA-Z0-9 (+ 22 other) ~3,517,150,425.18 years
  80. 17 a-zA-Z0-9 (+ 22 other) ~295,440,635,715.48 years
  81. 18 a-ZA-Z0-9 (+ 22 other) ~24,817,013,400,100.47 years
  82. 19 a-zA-Z0-9 (+ 22 other) ~2,084,629,125,608,439.36 years
  83. 20 a-zA-Z0-9 (+ 22 other) ~175,108,846,551,108,906.01 years
  84.  
  85. Conclusion: Keys derived from up-to-10-usually-used-pass-phrase-character pass phrases might be determined on a Cray XE6 with one million Opteron 6282 SE cores @ 3.1 GHz using a non-dictionary known-plaintext brute force attack within 3.66 days (only equivalents of Intel AES NI cycles taken into account).
  86.  
  87. 1 (255 characters) ~4.61 picoseconds
  88. 2 (255 characters) ~1.17 nanoseconds
  89. 3 (255 characters) ~299.53 nanoseconds
  90. 4 (255 characters) ~76.38 microseconds
  91. 5 (255 characters) ~19.48 miliseconds
  92. 6 (255 characters) ~4.97 seconds
  93. 7 (255 characters) ~21.11 minutes
  94. 8 (255 characters) ~3.74 days
  95. 9 (255 characters) ~2.61 years <-- infeasible
  96. 10 (255 characters) ~665.46 years
  97.  
  98. Conclusion: Keys derived from up-to-8-character pass phrases might be determined on a Cray XE6 with one million Opteron 6282 SE cores @ 3.1 GHz using a non-dictionary known-plaintext brute force attack within 3.74 days (only equivalents of Intel AES NI cycles taken into account).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement