Countering AES static S-box attack

No Thumbnail Available

Date

2013

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

The purpose of this research is to update AES with a dynamic s-box in order to counter the timing vulnerabilities that exist in AES. Static s-box allows data analyses attack and the eventual captures of sub-keys using inverse SubByte knowing inverse s-box. We propose a novel yet simple design and implementation with a very low overhead cost to existing AES in order to update s-box to a dynamic s-box depending on a variable sub-key at each round. This way, static data analysis of the program flow and data injection cannot affect the AES security. Copyright © 2013 ACM.

Description

STM Defense Technologies Engineering and Trade, Inc.; IGI Global Disseminator of Knowledge

Keywords

Advanced encryption standard, AES vulnerability, Dynamic s-box

Turkish CoHE Thesis Center URL

WoS Q

Scopus Q

Source

SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks -- 6th International Conference on Security of Information and Networks, SIN 2013 -- 26 November 2013 through 28 November 2013 -- Aksaray -- 102268

Volume

Issue

Start Page

256

End Page

260