{"id":54,"date":"2011-08-21T14:33:44","date_gmt":"2011-08-21T12:33:44","guid":{"rendered":"http:\/\/blog.nebule.org\/?p=54"},"modified":"2016-03-29T19:05:27","modified_gmt":"2016-03-29T17:05:27","slug":"unbreakable-aes","status":"publish","type":"post","link":"http:\/\/blog.nebule.org\/?p=54","title":{"rendered":"Unbreakable AES!?"},"content":{"rendered":"<p>Une nouvelle avanc\u00e9e sur la cryptanalyse de l&rsquo;<a title=\"http:\/\/fr.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" href=\"http:\/\/fr.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\">Advanced Encryption Standard<\/a> (AES) \u00e0 \u00e9t\u00e9 r\u00e9alis\u00e9e r\u00e9cemment.<\/p>\n<p>Voir en particulier l&rsquo;info sur <a title=\"http:\/\/www.clubic.com\/antivirus-securite-informatique\/actualite-441392-securite-chiffrement-aes-cause-chercheurs.html\" href=\"http:\/\/www.clubic.com\/antivirus-securite-informatique\/actualite-441392-securite-chiffrement-aes-cause-chercheurs.html\" target=\"_blank\">clubic.com<\/a>, le lien sur <a title=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aes.aspx\" href=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aes.aspx\" target=\"_blank\">research.microsoft.com<\/a> et le fichier <a title=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aesbc.pdf\" href=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aesbc.pdf\" target=\"_blank\">PDF<\/a> associ\u00e9.<\/p>\n<p><!--more--><\/p>\n<p>Techniquement, le gain annonc\u00e9 de 3 \u00e0 5 correspond grosso modo \u00e0 la perte de 2 bits sur la cl\u00e9 de chiffrement. Ce qui, comme annonc\u00e9 dans le document, ne remet pas en cause significativement la robustesse de l&rsquo;AES. M\u00eame avec une cl\u00e9 de 128bits, le temps n\u00e9cessaire pour le casser reste humainement (avec nos connaissance actuelles) hors de port\u00e9e.<\/p>\n<p>L&rsquo;AES est tr\u00e8s utilis\u00e9 de nos jours par la quasi totalit\u00e9 des syst\u00e8mes d&rsquo;informations n\u00e9cessitant du chiffrement. Cela deviendra un inconv\u00e9nient quand l&rsquo;AES tombera, et \u00e7a arrivera un jour. D&rsquo;o\u00f9 l&rsquo;utilit\u00e9 de ces recherches fondamentales pour v\u00e9rifier sa solidit\u00e9 et trouver ses failles. Ca nous montre aussi que pour l&rsquo;instant il reste malgr\u00e9 tout s\u00fcr dans son utilisation.<\/p>\n<p>Il faut penser d\u00e8s le d\u00e9but que le chiffrement peut (et doit) changer. Et c&rsquo;est valable aussi pour les fonctions de hash.<\/p>\n<p>Liens :<br \/>\n&#8211; <a title=\"http:\/\/www.clubic.com\/antivirus-securite-informatique\/actualite-441392-securite-chiffrement-aes-cause-chercheurs.html\" href=\"http:\/\/www.clubic.com\/antivirus-securite-informatique\/actualite-441392-securite-chiffrement-aes-cause-chercheurs.html\" target=\"_blank\">http:\/\/www.clubic.com\/antivirus &#8230; \/actualite-441392-securite-chiffrement-aes-cause-chercheurs.html<\/a><br \/>\n&#8211; <a title=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aes.aspx\" href=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aes.aspx\" target=\"_blank\">http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aes.aspx<\/a><br \/>\n&#8211; <a title=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aesbc.pdf\" href=\"http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aesbc.pdf\" target=\"_blank\">http:\/\/research.microsoft.com\/en-us\/projects\/cryptanalysis\/aesbc.pdf<\/a><br \/>\n&#8211; <a title=\"http:\/\/fr.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" href=\"http:\/\/fr.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\">http:\/\/fr.wikipedia.org\/wiki\/Advanced_Encryption_Standard<\/a><\/p>\n<p>Copie fichier PDF :<br \/>\n<a href=\"http:\/\/blog.nebule.org\/wp-uploads\/nebule\/2011\/08\/researchmicrosoftcom_aesbc.pdf\">researchmicrosoftcom_aesbc<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une nouvelle avanc\u00e9e sur la cryptanalyse de l&rsquo;Advanced Encryption Standard (AES) \u00e0 \u00e9t\u00e9 r\u00e9alis\u00e9e r\u00e9cemment. Voir en particulier l&rsquo;info sur clubic.com, le lien sur research.microsoft.com et le fichier PDF associ\u00e9.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,3,40],"tags":[129,159],"_links":{"self":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts\/54"}],"collection":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=54"}],"version-history":[{"count":1,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts\/54\/revisions"}],"predecessor-version":[{"id":2381,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts\/54\/revisions\/2381"}],"wp:attachment":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=54"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=54"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}