Is it possible to mathematically extract an AES key from black-box encrypt/decrypt hardware?Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair?Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintextdecrypt AES without whole keyIs my understanding of CPA indistinguishability experiment correct?Decrypt AES-encrypted data with another keyBreak AES-CFB mode having access to a AES-CTR black boxIs CBC mode with a fixed IV secure, if a counter is prepended to the plaintext?Decrypt AES key with RSA public keyWhy is Byte-at-a-time ECB decryption a vulnerability?AES encryption using a Diffie-Hellman questionPublic-private algorithm where it is not possible to recover public key from private key?Recovery of private key in AES-CBC from two ciphertexts with different IV, but identical plantext

How much of data wrangling is a data scientist's job?

Did Shadowfax go to Valinor?

NMaximize is not converging to a solution

Why is 150k or 200k jobs considered good when there's 300k+ births a month?

Approximately how much travel time was saved by the opening of the Suez Canal in 1869?

Is it tax fraud for an individual to declare non-taxable revenue as taxable income? (US tax laws)

strTok function (thread safe, supports empty tokens, doesn't change string)

Fully-Firstable Anagram Sets

Alternative to sending password over mail?

Is it possible to run Internet Explorer on OS X El Capitan?

Do I have a twin with permutated remainders?

What's the point of deactivating Num Lock on login screens?

What does it mean to describe someone as a butt steak?

Theorems that impeded progress

Why doesn't Newton's third law mean a person bounces back to where they started when they hit the ground?

Why "Having chlorophyll without photosynthesis is actually very dangerous" and "like living with a bomb"?

Has there ever been an airliner design involving reducing generator load by installing solar panels?

Why does Kotter return in Welcome Back Kotter?

meaning of に in 本当に?

Important Resources for Dark Age Civilizations?

Could an aircraft fly or hover using only jets of compressed air?

Rock identification in KY

How do I deal with an unproductive colleague in a small company?

How is the claim "I am in New York only if I am in America" the same as "If I am in New York, then I am in America?



Is it possible to mathematically extract an AES key from black-box encrypt/decrypt hardware?


Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair?Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintextdecrypt AES without whole keyIs my understanding of CPA indistinguishability experiment correct?Decrypt AES-encrypted data with another keyBreak AES-CFB mode having access to a AES-CTR black boxIs CBC mode with a fixed IV secure, if a counter is prepended to the plaintext?Decrypt AES key with RSA public keyWhy is Byte-at-a-time ECB decryption a vulnerability?AES encryption using a Diffie-Hellman questionPublic-private algorithm where it is not possible to recover public key from private key?Recovery of private key in AES-CBC from two ciphertexts with different IV, but identical plantext













3












$begingroup$


I presented our mathematician with an idea:




If you have a black box that encrypts or decrypts AES with the same 128 bit key (you don't have any direct access to the key), and you control the input and the direction (enc/dec) and can see the output,
can you mathematically derive the key? How many tests will you have to run to be able to derive the key?




He said he remembers there was a paper that said it will take only $2^16$ tries to derive the key. Does this paper exist? Dan anybody point me in the right direction?










share|improve this question











$endgroup$







  • 1




    $begingroup$
    This seems like almost a duplicate of Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintext and Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair? except that those questions ask about known-plaintext rather than chosen-plaintext attacks. The answers are effectively the same, though.
    $endgroup$
    – Ilmari Karonen
    2 days ago






  • 1




    $begingroup$
    Only with side channel attacks like power analysis. Otherwise it is infeasible
    $endgroup$
    – Natanael
    2 days ago










  • $begingroup$
    Any chance this relates to the lack of AES' information theoretic security? 65,536 IO pairings may well completely determine a mathematical model of the interior of the box. Simultaneous equation solving would then theoretically allow key recovery much more readily than brute force. Does this sound familiar at all?
    $endgroup$
    – Paul Uszak
    2 days ago















3












$begingroup$


I presented our mathematician with an idea:




If you have a black box that encrypts or decrypts AES with the same 128 bit key (you don't have any direct access to the key), and you control the input and the direction (enc/dec) and can see the output,
can you mathematically derive the key? How many tests will you have to run to be able to derive the key?




He said he remembers there was a paper that said it will take only $2^16$ tries to derive the key. Does this paper exist? Dan anybody point me in the right direction?










share|improve this question











$endgroup$







  • 1




    $begingroup$
    This seems like almost a duplicate of Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintext and Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair? except that those questions ask about known-plaintext rather than chosen-plaintext attacks. The answers are effectively the same, though.
    $endgroup$
    – Ilmari Karonen
    2 days ago






  • 1




    $begingroup$
    Only with side channel attacks like power analysis. Otherwise it is infeasible
    $endgroup$
    – Natanael
    2 days ago










  • $begingroup$
    Any chance this relates to the lack of AES' information theoretic security? 65,536 IO pairings may well completely determine a mathematical model of the interior of the box. Simultaneous equation solving would then theoretically allow key recovery much more readily than brute force. Does this sound familiar at all?
    $endgroup$
    – Paul Uszak
    2 days ago













3












3








3





$begingroup$


I presented our mathematician with an idea:




If you have a black box that encrypts or decrypts AES with the same 128 bit key (you don't have any direct access to the key), and you control the input and the direction (enc/dec) and can see the output,
can you mathematically derive the key? How many tests will you have to run to be able to derive the key?




He said he remembers there was a paper that said it will take only $2^16$ tries to derive the key. Does this paper exist? Dan anybody point me in the right direction?










share|improve this question











$endgroup$




I presented our mathematician with an idea:




If you have a black box that encrypts or decrypts AES with the same 128 bit key (you don't have any direct access to the key), and you control the input and the direction (enc/dec) and can see the output,
can you mathematically derive the key? How many tests will you have to run to be able to derive the key?




He said he remembers there was a paper that said it will take only $2^16$ tries to derive the key. Does this paper exist? Dan anybody point me in the right direction?







aes chosen-plaintext-attack chosen-ciphertext-attack key-recovery






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited 2 days ago









AleksanderRas

2,9521935




2,9521935










asked 2 days ago









Anton VainerAnton Vainer

253




253







  • 1




    $begingroup$
    This seems like almost a duplicate of Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintext and Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair? except that those questions ask about known-plaintext rather than chosen-plaintext attacks. The answers are effectively the same, though.
    $endgroup$
    – Ilmari Karonen
    2 days ago






  • 1




    $begingroup$
    Only with side channel attacks like power analysis. Otherwise it is infeasible
    $endgroup$
    – Natanael
    2 days ago










  • $begingroup$
    Any chance this relates to the lack of AES' information theoretic security? 65,536 IO pairings may well completely determine a mathematical model of the interior of the box. Simultaneous equation solving would then theoretically allow key recovery much more readily than brute force. Does this sound familiar at all?
    $endgroup$
    – Paul Uszak
    2 days ago












  • 1




    $begingroup$
    This seems like almost a duplicate of Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintext and Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair? except that those questions ask about known-plaintext rather than chosen-plaintext attacks. The answers are effectively the same, though.
    $endgroup$
    – Ilmari Karonen
    2 days ago






  • 1




    $begingroup$
    Only with side channel attacks like power analysis. Otherwise it is infeasible
    $endgroup$
    – Natanael
    2 days ago










  • $begingroup$
    Any chance this relates to the lack of AES' information theoretic security? 65,536 IO pairings may well completely determine a mathematical model of the interior of the box. Simultaneous equation solving would then theoretically allow key recovery much more readily than brute force. Does this sound familiar at all?
    $endgroup$
    – Paul Uszak
    2 days ago







1




1




$begingroup$
This seems like almost a duplicate of Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintext and Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair? except that those questions ask about known-plaintext rather than chosen-plaintext attacks. The answers are effectively the same, though.
$endgroup$
– Ilmari Karonen
2 days ago




$begingroup$
This seems like almost a duplicate of Shortcuts / practicality of brute forcing block cipher (AES) + ECB with known plaintext and Is it possible to obtain AES-128 key from a known ciphertext-plaintext pair? except that those questions ask about known-plaintext rather than chosen-plaintext attacks. The answers are effectively the same, though.
$endgroup$
– Ilmari Karonen
2 days ago




1




1




$begingroup$
Only with side channel attacks like power analysis. Otherwise it is infeasible
$endgroup$
– Natanael
2 days ago




$begingroup$
Only with side channel attacks like power analysis. Otherwise it is infeasible
$endgroup$
– Natanael
2 days ago












$begingroup$
Any chance this relates to the lack of AES' information theoretic security? 65,536 IO pairings may well completely determine a mathematical model of the interior of the box. Simultaneous equation solving would then theoretically allow key recovery much more readily than brute force. Does this sound familiar at all?
$endgroup$
– Paul Uszak
2 days ago




$begingroup$
Any chance this relates to the lack of AES' information theoretic security? 65,536 IO pairings may well completely determine a mathematical model of the interior of the box. Simultaneous equation solving would then theoretically allow key recovery much more readily than brute force. Does this sound familiar at all?
$endgroup$
– Paul Uszak
2 days ago










1 Answer
1






active

oldest

votes


















5












$begingroup$

What you describe is Chosen-Plaintext Attack (CPA) and AES and secure block ciphers are designed to be secure against this.



Having $2^16$ chosen-plaintext under one key doesn't help you to extract the AES key. You have to go to the full-brute force to find the key.



Since you have one target you cannot get help from attacking many keys simultaneously. For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$. If you have a billion target (~$2^30$) the cost will be ~$2^98$ to find one of the target keys.






share|improve this answer











$endgroup$












  • $begingroup$
    What does the sentence ‘For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$.’ mean?
    $endgroup$
    – Squeamish Ossifrage
    2 days ago










  • $begingroup$
    In some cases, the black box may reside in many days in front of you, thus, during those days, you will get many target keys.
    $endgroup$
    – kelalaka
    yesterday











Your Answer





StackExchange.ifUsing("editor", function ()
return StackExchange.using("mathjaxEditing", function ()
StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix)
StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
);
);
, "mathjax-editing");

StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "281"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68497%2fis-it-possible-to-mathematically-extract-an-aes-key-from-black-box-encrypt-decry%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









5












$begingroup$

What you describe is Chosen-Plaintext Attack (CPA) and AES and secure block ciphers are designed to be secure against this.



Having $2^16$ chosen-plaintext under one key doesn't help you to extract the AES key. You have to go to the full-brute force to find the key.



Since you have one target you cannot get help from attacking many keys simultaneously. For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$. If you have a billion target (~$2^30$) the cost will be ~$2^98$ to find one of the target keys.






share|improve this answer











$endgroup$












  • $begingroup$
    What does the sentence ‘For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$.’ mean?
    $endgroup$
    – Squeamish Ossifrage
    2 days ago










  • $begingroup$
    In some cases, the black box may reside in many days in front of you, thus, during those days, you will get many target keys.
    $endgroup$
    – kelalaka
    yesterday















5












$begingroup$

What you describe is Chosen-Plaintext Attack (CPA) and AES and secure block ciphers are designed to be secure against this.



Having $2^16$ chosen-plaintext under one key doesn't help you to extract the AES key. You have to go to the full-brute force to find the key.



Since you have one target you cannot get help from attacking many keys simultaneously. For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$. If you have a billion target (~$2^30$) the cost will be ~$2^98$ to find one of the target keys.






share|improve this answer











$endgroup$












  • $begingroup$
    What does the sentence ‘For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$.’ mean?
    $endgroup$
    – Squeamish Ossifrage
    2 days ago










  • $begingroup$
    In some cases, the black box may reside in many days in front of you, thus, during those days, you will get many target keys.
    $endgroup$
    – kelalaka
    yesterday













5












5








5





$begingroup$

What you describe is Chosen-Plaintext Attack (CPA) and AES and secure block ciphers are designed to be secure against this.



Having $2^16$ chosen-plaintext under one key doesn't help you to extract the AES key. You have to go to the full-brute force to find the key.



Since you have one target you cannot get help from attacking many keys simultaneously. For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$. If you have a billion target (~$2^30$) the cost will be ~$2^98$ to find one of the target keys.






share|improve this answer











$endgroup$



What you describe is Chosen-Plaintext Attack (CPA) and AES and secure block ciphers are designed to be secure against this.



Having $2^16$ chosen-plaintext under one key doesn't help you to extract the AES key. You have to go to the full-brute force to find the key.



Since you have one target you cannot get help from attacking many keys simultaneously. For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$. If you have a billion target (~$2^30$) the cost will be ~$2^98$ to find one of the target keys.







share|improve this answer














share|improve this answer



share|improve this answer








edited 2 days ago

























answered 2 days ago









kelalakakelalaka

8,68022351




8,68022351











  • $begingroup$
    What does the sentence ‘For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$.’ mean?
    $endgroup$
    – Squeamish Ossifrage
    2 days ago










  • $begingroup$
    In some cases, the black box may reside in many days in front of you, thus, during those days, you will get many target keys.
    $endgroup$
    – kelalaka
    yesterday
















  • $begingroup$
    What does the sentence ‘For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$.’ mean?
    $endgroup$
    – Squeamish Ossifrage
    2 days ago










  • $begingroup$
    In some cases, the black box may reside in many days in front of you, thus, during those days, you will get many target keys.
    $endgroup$
    – kelalaka
    yesterday















$begingroup$
What does the sentence ‘For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$.’ mean?
$endgroup$
– Squeamish Ossifrage
2 days ago




$begingroup$
What does the sentence ‘For $t$ target the expected cost is $2^128/t$ that will be far below $2^128/t$.’ mean?
$endgroup$
– Squeamish Ossifrage
2 days ago












$begingroup$
In some cases, the black box may reside in many days in front of you, thus, during those days, you will get many target keys.
$endgroup$
– kelalaka
yesterday




$begingroup$
In some cases, the black box may reside in many days in front of you, thus, during those days, you will get many target keys.
$endgroup$
– kelalaka
yesterday

















draft saved

draft discarded
















































Thanks for contributing an answer to Cryptography Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

Use MathJax to format equations. MathJax reference.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68497%2fis-it-possible-to-mathematically-extract-an-aes-key-from-black-box-encrypt-decry%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

getting Checkpoint VPN SSL Network Extender working in the command lineHow to connect to CheckPoint VPN on Ubuntu 18.04LTS?Will the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayVPN SSL Network Extender in FirefoxLinux Checkpoint SNX tool configuration issuesCheck Point - Connect under Linux - snx + OTPSNX VPN Ububuntu 18.XXUsing Checkpoint VPN SSL Network Extender CLI with certificateVPN with network manager (nm-applet) is not workingWill the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayImport VPN config files to NetworkManager from command lineTrouble connecting to VPN using network-manager, while command line worksStart a VPN connection with PPTP protocol on command linestarting a docker service daemon breaks the vpn networkCan't connect to vpn with Network-managerVPN SSL Network Extender in FirefoxUsing Checkpoint VPN SSL Network Extender CLI with certificate

Cannot Extend partition with GParted The 2019 Stack Overflow Developer Survey Results Are In Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) 2019 Community Moderator Election ResultsCan't increase partition size with GParted?GParted doesn't recognize the unallocated space after my current partitionWhat is the best way to add unallocated space located before to Ubuntu 12.04 partition with GParted live?I can't figure out how to extend my Arch home partition into free spaceGparted Linux Mint 18.1 issueTrying to extend but swap partition is showing as Unknown in Gparted, shows proper from fdiskRearrange partitions in gparted to extend a partitionUnable to extend partition even though unallocated space is next to it using GPartedAllocate free space to root partitiongparted: how to merge unallocated space with a partition

NetworkManager fails with “Could not find source connection”Trouble connecting to VPN using network-manager, while command line worksHow can I be notified about state changes to a VPN adapterBacktrack 5 R3 - Refuses to connect to VPNFeed all traffic through OpenVPN for a specific network namespace onlyRun daemon on startup in Debian once openvpn connection establishedpfsense tcp connection between openvpn and lan is brokenInternet connection problem with web browsers onlyWhy does NetworkManager explicitly support tun/tap devices?Browser issues with VPNTwo IP addresses assigned to the same network card - OpenVPN issues?Cannot connect to WiFi with nmcli, although secrets are provided