Blog | G5 Cyber Security

AES Key Break Time

TL;DR

Breaking an AES key depends on the key length (128, 192 or 256 bits) and available computing power. A brute-force attack is theoretically possible but practically infeasible with current technology for strong keys. This guide explains how to estimate break times.

Understanding AES Key Strength

AES (Advanced Encryption Standard) uses symmetric key cryptography, meaning the same key encrypts and decrypts data. The security of AES relies entirely on keeping the key secret. Longer keys are exponentially harder to crack.

Estimating Break Time

  1. Key Length: Determine the length of the AES key being used (128, 192 or 256 bits).
  2. Brute-Force Calculation: The theoretical minimum time to break an AES key using brute force is based on trying every possible combination. There are 2key_length possible keys.
    • For a 128-bit key, there are 2128 (approximately 3.4 x 1038) possibilities.
    • For a 192-bit key, there are 2192 (approximately 6.2 x 1057) possibilities.
    • For a 256-bit key, there are 2256 (approximately 1.16 x 1077) possibilities.
  3. Hashing Speed: Estimate the hashing speed of your attack platform. This is how many keys can be tested per second. Modern GPUs can perform trillions of hashes per second (TH/s). CPUs are significantly slower.
    • Example: A GPU might achieve 10 TH/s = 10 x 1012 hashes/second.
  4. Calculate Time in Seconds: Divide the total number of possible keys by the hashing speed.
    time_in_seconds = (2 ^ key_length) / hashing_speed
    • Example (128-bit key, 10 TH/s): time_in_seconds = (2128) / (10 x 1012) ≈ 3.4 x 1026 seconds
  5. Convert to More Understandable Units: Convert the time in seconds into years.
    time_in_years = time_in_seconds / (60 * 60 * 24 * 365.25)
    • Example (128-bit key, 10 TH/s): time_in_years ≈ 1.08 x 1019 years

Practical Considerations

The above calculation assumes a perfect brute-force attack with no optimizations. In reality:

Key Takeaways

Exit mobile version