Countering AES static S-box attack

No Thumbnail Available

Date

2013

Journal Title

Journal ISSN

Volume Title

Publisher

Open Access Color

OpenAIRE Downloads

OpenAIRE Views

Research Projects

Organizational Units

Journal Issue

Abstract

The purpose of this research is to update AES with a dynamic s-box in order to counter the timing vulnerabilities that exist in AES. Static s-box allows data analyses attack and the eventual captures of sub-keys using inverse SubByte knowing inverse s-box. We propose a novel yet simple design and implementation with a very low overhead cost to existing AES in order to update s-box to a dynamic s-box depending on a variable sub-key at each round. This way, static data analysis of the program flow and data injection cannot affect the AES security. Copyright © 2013 ACM.

Description

STM Defense Technologies Engineering and Trade, Inc.; IGI Global Disseminator of Knowledge

Keywords

Advanced encryption standard, AES vulnerability, Dynamic s-box

Turkish CoHE Thesis Center URL

Fields of Science

Citation

6

WoS Q

Scopus Q

Source

SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks -- 6th International Conference on Security of Information and Networks, SIN 2013 -- 26 November 2013 through 28 November 2013 -- Aksaray -- 102268

Volume

Issue

Start Page

256

End Page

260