Fine Tuning the Advanced Encryption Standard (AES)
dc.contributor.author | Rahnama, Behnam | |
dc.contributor.author | Elçi, Atilla | |
dc.contributor.author | Eweoya, Ibukun | |
dc.date.accessioned | 13.07.201910:50:10 | |
dc.date.accessioned | 2019-07-16T09:20:11Z | |
dc.date.available | 13.07.201910:50:10 | |
dc.date.available | 2019-07-16T09:20:11Z | |
dc.date.issued | 2012 | |
dc.department | [Rahnama, Behnam -- Eweoya, Ibukun] European Univ Lefke, TR-10 Mersin, Trnc, Turkey -- [Elci, Atilla] Aksaray Univ, Aksaray, Turkey | |
dc.description | 5th International Conference on Security of Information and Networks (SIN) -- OCT 25-27, 2012 -- Malaviya Natl Inst Technol, Dept Comp Engn, Jaipur, INDIA | |
dc.description | WOS:000312505600044 | |
dc.description.abstract | The Advanced Encryption Standard has been playing a prominent role in embedded systems security for a decade after being announced by the National Institute of Standards and Technology (NIST). However, vulnerabilities have emerged, especially timing attacks, that challenges its security. This paper demonstrates the introduction of a unique diffusion and confusion scheme in Rijndael by incorporating ASCII codes manipulations using playfair ciphering into the algorithm; it is not depended on the key and input thereby making it a constant time module in AES algorithm. The concept counters possible leakages from the S-box lookups; intermediary operations (SubstituteByte, ShiftRows, MixColumns, AddRoundKey) of the AES are still applicable but it becomes impossible for cryptanalysis discovery of enciphering method and ciphertext bits. Success of cracking efforts will be beyond human patience as it avoids statistical precision, thereby curbing timing attacks. | |
dc.description.sponsorship | Malaviya Natl Inst Technol, Macquarie Univ, Aksaray Univ, So Fed Univ, Indian Inst Technol, Govt India, Minist Informat & Commun Technol, Project Informat Secur Educ Awareness (ISEA) | |
dc.identifier.endpage | 209 | en_US |
dc.identifier.isbn | 978-1-4503-1668-2 | |
dc.identifier.scopusquality | N/A | |
dc.identifier.startpage | 205 | en_US |
dc.identifier.uri | https://hdl.handle.net/20.500.12451/5067 | |
dc.identifier.wos | WOS:000312505600044 | |
dc.identifier.wosquality | N/A | |
dc.indekslendigikaynak | Web of Science | |
dc.indekslendigikaynak | Scopus | |
dc.language.iso | en | |
dc.publisher | Association for Computing Machinery | |
dc.relation.ispartof | PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS | |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
dc.rights | info:eu-repo/semantics/closedAccess | |
dc.subject | Rijndael | |
dc.subject | State | |
dc.subject | Plaintext | |
dc.subject | Ciphertext | |
dc.subject | S-box | |
dc.subject | ASCII | |
dc.subject | MixColumns | |
dc.subject | ShiftRows | |
dc.subject | SubBytes | |
dc.subject | AddRoundkey | |
dc.title | Fine Tuning the Advanced Encryption Standard (AES) | |
dc.type | Conference Object |