Please use this identifier to cite or link to this item:
http://repository.elizadeuniversity.edu.ng/jspui/handle/20.500.12398/1244
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rahnama, Behnam | - |
dc.contributor.author | Elci, Atilla | - |
dc.contributor.author | Eweoya, Ibukun | - |
dc.date.accessioned | 2021-09-23T10:53:58Z | - |
dc.date.available | 2021-09-23T10:53:58Z | - |
dc.date.issued | 2012-10 | - |
dc.identifier.citation | Rahnama, B., Elci, A., & Eweoya, I. (2012). Fine tuning the advanced encryption standard (AES). Proceedings of the Fifth International Conference on Security of Information and Networks - SIN ’12. doi:10.1145/2388576.2388609 | en_US |
dc.identifier.uri | https://doi.org/10.1145/2388576.2388609 | - |
dc.identifier.uri | http://repository.elizadeuniversity.edu.ng/jspui/handle/20.500.12398/1244 | - |
dc.description | Staff Publication | en_US |
dc.description.abstract | The Advanced Encryption Standard has been playing a prominent role in embedded systems security for a decade after being announced by the National Institute of Standards and Technology (NIST). However, vulnerabilities have emerged, especially timing attacks, that challenges its security. This paper demonstrates the introduction of a unique diffusion and confusion scheme in Rijndael by incorporating ASCII codes manipulations using playfair ciphering into the algorithm; it is not dependent on the key and input thereby making it a constant time module in AES algorithm. The concept counters possible leakages from the S-box lookups; intermediary operations (SubstituteByte, ShiftRows, MixColumns, AddRoundKey) of the AES are still applicable but it becomes impossible for cryptanalysis discovery of enciphering method and ciphertext bits. Success of cracking efforts will be beyond human patience as it avoids statistical precision, thereby curbing timing attacks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | SIN '12: Proceedings of the Fifth International Conference on Security of Information and Networks | en_US |
dc.subject | Rijndael | en_US |
dc.subject | State | en_US |
dc.subject | Plaintext | en_US |
dc.subject | Ciphertext | en_US |
dc.subject | S-box | en_US |
dc.subject | ASCII | en_US |
dc.subject | Mixcolumns | en_US |
dc.subject | ShiftRows | en_US |
dc.subject | SubBytes | en_US |
dc.subject | AddRoundkey | en_US |
dc.subject | Algorithms | en_US |
dc.subject | Design | en_US |
dc.subject | Security | en_US |
dc.subject | Reliability | en_US |
dc.title | Fine tuning the advanced encryption standard (AES) | en_US |
dc.type | Article | en_US |
Appears in Collections: | Research Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Pages from rahnama2012.pdf | 553.34 kB | Adobe PDF | View/Open |
Items in EUSpace are protected by copyright, with all rights reserved, unless otherwise indicated.