Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

AES 512 Bit Encryption Library

Posted on 2013-05-22
3
Medium Priority
?
2,600 Views
Last Modified: 2013-06-06
I am looking for any commercial or non-commercial encryption libraries that support AES with 512 bit key length. Is anyone aware of such libraries ? We need libraries as native Win32 DLLs as well as Java libraries.

Does anyone has experience in using AES with key length longer than 256 bit ?
0
Comment
Question by:seclore
3 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 39188786
I'd suggest taking a look at Crypto++ (http://www.cryptopp.com/) - it is a great library for all cryptographic purposes. I'm mostly using it for RSA at the moment, but also used it for AES, though that's a while ago.
0
 

Author Comment

by:seclore
ID: 39188807
This library does not support key length longer than 256 bit. That does not meet my requirements.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 600 total points
ID: 39189116
M$'s own is only 256 max- which is all it should be according to AES own specifications,
http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf
AES fixes the block length to 128 bits, and supports key lengths of 128, 192 or 256 bits only. (page 1, last sentence, page 44 as well)
 
Why do you need more than 256, it might not make what your securing any stronger... Different (chaining)modes of AES (or other algo's) also make them "stonger/weaker" depending on the situations.
http://en.wikipedia.org/wiki/Key_size
BruteForcing the KEY of AES would be much harder, even at much smaller lengths, than bruteforcing the password chosen to protect the data in most cases. Increasing the keysize in no way makes up for bad password choice.
Here is a nice chart, tell it what year you'd allow your key to be broken in, and it will tell you the minimum length to use: http://www.keylength.com/en/compare/
In 2040 someone could possible BF the key of my encrypted container if I use AES128.
-rich
0

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Although free tools can be helpful to a limited extent, it’s better to stick to paid versions for business use.
The viewer will learn how to use the return statement in functions in C++. The video will also teach the user how to pass data to a function and have the function return data back for further processing.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question