For biclique attacks on AES-192 and AES-256, the computational complexities of 2 189.7 and 2 254.4 respectively apply. įor AES-128, the key can be recovered with a computational complexity of 2 126.1 using the biclique attack. Attacks have been published that are computationally faster than a full brute-force attack, though none as of 2013 are computationally feasible.