4

Given an encrypted file, the original unencrypted (cleartext) file, and knowledge of which AES encryption algorithm was used, is it possible to determine the key that was used to encrypt the data in a reasonable period of time?

I am not looking for details on how AES works, just a simple answer.

yyyyyyy
  • 12,261
  • 4
  • 48
  • 68
andrewgu
  • 143
  • 1
  • 5

2 Answers2

6

The simple answer is no, known plaintext attacks should not be possible on an AES-encrypted file, assuming that AES is applied correctly. No information about the encrypted file or key should be leaked even if the adversary can guesss the contents of "the original unencrypted (cleartext) file".

Beware that any mistake into a protocol specification or implementation may negate the security of AES - and this could include the security of the key used. Point in case: some "AES encrypted" USB devices stored the key next to the ciphertext, in case somebody forgot the password.

Maarten Bodewes
  • 96,351
  • 14
  • 169
  • 323
0

No. That would amount to cracking AES, which is not feasible.

DeepSpace101
  • 1,717
  • 3
  • 17
  • 24