My understanding of the cryptanalysis of AES, is based on what I've read on Wikipedia and my intuition, I have nothing but self-taught education on the subject.
So I want you to imagine: I have only TWO blocks of 128-bit cipher text.
The input was 256bits, we did not use any padding, we also ignored IVs and Salts, when implementing our "demonstration of Rijndael". Finally and most importantly, the two blocks of cipher text, are different by just one bit (in an arbitrary space), however: When presented with the two 128-bit blocks (and just a 128-bit key, both in same), we can come under two conditions:
Condition one: We know none of the weaknesses and similar plain-texts in these two blocks, I just mentioned, how easily could we discover it?
Condition two: We know everything I just mentioned above, apart from which bit is flipped and what the two plain texts and the key (let's keep it simple and make the key, only 128 bits). Can we discover much here? How do we go about it?
I said in the title, this is about "practical attacks", I don't know if even with all these conditions knowingly been met, there is much we can do, however since we've used Rijndael, so grossly incorrectly, I assume we're on our way to be able to deduce some information... In which of either, both or none, does an "attacker" learn anything about these two blocks, they weren't told?