Solved

AES 512 Bit Encryption Library

Posted on 2013-05-22
3
2,059 Views
Last Modified: 2013-06-06
I am looking for any commercial or non-commercial encryption libraries that support AES with 512 bit key length. Is anyone aware of such libraries ? We need libraries as native Win32 DLLs as well as Java libraries.

Does anyone has experience in using AES with key length longer than 256 bit ?
0
Comment
Question by:seclore
3 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 39188786
I'd suggest taking a look at Crypto++ (http://www.cryptopp.com/) - it is a great library for all cryptographic purposes. I'm mostly using it for RSA at the moment, but also used it for AES, though that's a while ago.
0
 

Author Comment

by:seclore
ID: 39188807
This library does not support key length longer than 256 bit. That does not meet my requirements.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 200 total points
ID: 39189116
M$'s own is only 256 max- which is all it should be according to AES own specifications,
http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf
AES fixes the block length to 128 bits, and supports key lengths of 128, 192 or 256 bits only. (page 1, last sentence, page 44 as well)
 
Why do you need more than 256, it might not make what your securing any stronger... Different (chaining)modes of AES (or other algo's) also make them "stonger/weaker" depending on the situations.
http://en.wikipedia.org/wiki/Key_size
BruteForcing the KEY of AES would be much harder, even at much smaller lengths, than bruteforcing the password chosen to protect the data in most cases. Increasing the keysize in no way makes up for bad password choice.
Here is a nice chart, tell it what year you'd allow your key to be broken in, and it will tell you the minimum length to use: http://www.keylength.com/en/compare/
In 2040 someone could possible BF the key of my encrypted container if I use AES128.
-rich
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
The viewer will learn how to use the return statement in functions in C++. The video will also teach the user how to pass data to a function and have the function return data back for further processing.
The viewer will be introduced to the technique of using vectors in C++. The video will cover how to define a vector, store values in the vector and retrieve data from the values stored in the vector.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now