http://www.schneier.com/blog/archives/2009/07/another_new_aes.html

Practical related-key/related-subkey attacks on AES with a 256-bit key with 9, 
10 and 11 rounds. The official standard uses 14 rounds, so there is precious 
little safety margin - attacks always get better.

We use AES/256 (technically we use Rijndael with 256 bit key and 256 bit block 
size mostly, which isn't strictly AES, although we use 128 bit block size, 
which is, for store encryption).

Such attacks rely on related-key weaknesses in the protocol (as in WEP, where 
the IV was too small). In theory we shouldn't have any, although I am not 
entirely sure how to determine this. We shouldn't have known ciphertext, 
because we have an unforgeable authenticator on all packets, but I'm not sure 
exactly what the definition of a related-key weakness is.

Nonetheless, it would seem prudent to increase the number of rounds as Schneier 
outlines (28 rounds for a 256-bit key). We have the infrastructure to do this 
without too much trouble, with key subtypes and negotiation types. Moving to 
AES/128 would be considerably more work.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 835 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20090731/18fedc1b/attachment.pgp>

Reply via email to