Countering AES static S-box attack
No Thumbnail Available
Date
2013
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Open Access Color
OpenAIRE Downloads
OpenAIRE Views
Abstract
The purpose of this research is to update AES with a dynamic s-box in order to counter the timing vulnerabilities that exist in AES. Static s-box allows data analyses attack and the eventual captures of sub-keys using inverse SubByte knowing inverse s-box. We propose a novel yet simple design and implementation with a very low overhead cost to existing AES in order to update s-box to a dynamic s-box depending on a variable sub-key at each round. This way, static data analysis of the program flow and data injection cannot affect the AES security. Copyright © 2013 ACM.
Description
STM Defense Technologies Engineering and Trade, Inc.; IGI Global Disseminator of Knowledge
Keywords
Advanced encryption standard, AES vulnerability, Dynamic s-box
Turkish CoHE Thesis Center URL
Fields of Science
Citation
6
WoS Q
Scopus Q
Source
SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks -- 6th International Conference on Security of Information and Networks, SIN 2013 -- 26 November 2013 through 28 November 2013 -- Aksaray -- 102268
Volume
Issue
Start Page
256
End Page
260