Can AES be hacked with enough decrypted data? Why or why not?

Say I have a large number of files, say, 20 GB, all encrypted with the same AES key. Each file is individually encrypted.

Now suppose I get 10 GB of these files in decrypted format. And even if I can compare what files are, using their sizes.

It seems that I have a lot of information here - is it possible for me to crack the key and pull out the remaining 10 GB of data in unencrypted form?

Please help me understand why this is possible or impossible. I have searched the net many times, and I cannot find anyone to discuss this topic. All I can find are general statements about how AES is “indestructible”. But I'm curious if this continuity persists if a large amount of data has been compromised.

+4
source share
2 answers

No, this is impossible (due).

The attack script you are referring to is a common scenario called a known-plaintext attack .

A cipher is only considered secure if it is resistant to these (and many other) attacks. "Sustainability" in this context means that having plain text (no matter how much) does not make it easier to find the key.

As for this, it's hard to understand without knowing much about the structure of AES and the possible attack modes. For an introduction, see, for example, the Wikipedia article links to AES or take a look at RijndaeL Design: AES is an advanced encryption standard (by Daemen and Rijmen themselves).

A related question: Why is AES resistant to clear-text attacks?

+9
source

AES is not streaming encryption, and the output changes a lot for small input changes (flood effect)

AES encryption violation using decrypted data

+1
source

All Articles