Countering AES static S-box attack
No Thumbnail Available
Date
2013
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The purpose of this research is to update AES with a dynamic s-box in order to counter the timing vulnerabilities that exist in AES. Static s-box allows data analyses attack and the eventual captures of sub-keys using inverse SubByte knowing inverse s-box. We propose a novel yet simple design and implementation with a very low overhead cost to existing AES in order to update s-box to a dynamic s-box depending on a variable sub-key at each round. This way, static data analysis of the program flow and data injection cannot affect the AES security. Copyright © 2013 ACM.
Description
STM Defense Technologies Engineering and Trade, Inc.; IGI Global Disseminator of Knowledge
Keywords
Advanced encryption standard, AES vulnerability, Dynamic s-box
Turkish CoHE Thesis Center URL
Citation
6
WoS Q
N/A
Scopus Q
N/A
Source
SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks -- 6th International Conference on Security of Information and Networks, SIN 2013 -- 26 November 2013 through 28 November 2013 -- Aksaray -- 102268
Volume
Issue
Start Page
256
End Page
260