PDA

View Full Version : [all variants] AES Security w/ Multiple Files



Catatonic Turtle
March 18th, 2009, 10:58 PM
I've been wondering... is AES any less secure if I have multiple volumes all containing different encrypted data but with the same password? So say for example I had 50 TrueCrypt volumes, all of which use the same password... could a hacker use this to somehow reconstruct the password?

Thanks in advance!

snova
March 19th, 2009, 12:30 AM
I've been wondering... is AES any less secure if I have multiple volumes all containing different encrypted data but with the same password?

Yes, but so is any cipher. The more the better for an attacker.


So say for example I had 50 TrueCrypt volumes, all of which use the same password... could a hacker use this to somehow reconstruct the password?

Possibly, but I doubt it.

Assuming there is no attack more efficient than brute force, there's no hope, see: Brute force attack (http://en.wikipedia.org/wiki/Brute_force_attack)


The amount of time required to break a 128-bit key is also daunting. Each of the 2^128 (340,282,366,920,938,463,463,374,607,431,768,211,4 56) possibilities must be checked. A device that could check a billion billion keys (10^18 ) per second would still require about 10^13 years to exhaust the key space. This is a thousand times longer than the age of the universe, which is about 13,000,000,000 (1.3 x 10^10) years.

As AES is quite secure (see: Wikipedia (http://en.wikipedia.org/wiki/Advanced_Encryption_Standard#Security)), I'd be inclined to believe you're pretty safe.

That doesn't mean you should depend on it, though...

Catatonic Turtle
March 19th, 2009, 02:16 AM
Ok thanks snova, that makes sense.