Rahnama,B.Kiran,Y.Dara,R.2024-05-252024-05-2520136978-145032498-410.1145/2523514.25235442-s2.0-84893302410https://doi.org/10.1145/2523514.2523544https://hdl.handle.net/20.500.14517/2287STM Defense Technologies Engineering and Trade, Inc.; IGI Global Disseminator of KnowledgeThe purpose of this research is to update AES with a dynamic s-box in order to counter the timing vulnerabilities that exist in AES. Static s-box allows data analyses attack and the eventual captures of sub-keys using inverse SubByte knowing inverse s-box. We propose a novel yet simple design and implementation with a very low overhead cost to existing AES in order to update s-box to a dynamic s-box depending on a variable sub-key at each round. This way, static data analysis of the program flow and data injection cannot affect the AES security. Copyright © 2013 ACM.eninfo:eu-repo/semantics/closedAccessAdvanced encryption standardAES vulnerabilityDynamic s-boxCountering AES static S-box attackConference Object256260