Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
Computer Networks: The International Journal of Computer and Telecommunications Networking
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
Fast and Efficient Implementation of AES via Instruction Set Extensions
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
Cache attacks and countermeasures: the case of AES
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Countering AES static s-box attack
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
The Advanced Encryption Standard has been playing a prominent role in embedded systems security for a decade after being announced by the National Institute of Standards and Technology (NIST). However, vulnerabilities have emerged, especially timing attacks, that challenges its security. This paper demonstrates the introduction of a unique diffusion and confusion scheme in Rijndael by incorporating ASCII codes manipulations using playfair ciphering into the algorithm; it is not dependent on the key and input thereby making it a constant time module in AES algorithm. The concept counters possible leakages from the S-box lookups; intermediary operations (SubstituteByte, ShiftRows, MixColumns, AddRoundKey) of the AES are still applicable but it becomes impossible for cryptanalysis discovery of enciphering method and ciphertext bits. Success of cracking efforts will be beyond human patience as it avoids statistical precision, thereby curbing timing attacks.