Countering AES static s-box attack

  • Authors:
  • Behnam Rahnama;Yunus Kıran;Raz Dara

  • Affiliations:
  • T. C. Okan University, Istanbul, Turkey;European University of Lefke, Gemikonagi, North Cyprus;European University of Lefke, Gemikonagi, North Cyprus

  • Venue:
  • Proceedings of the 6th International Conference on Security of Information and Networks
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The purpose of this research is to update AES with a dynamic s-box in order to counter the timing vulnerabilities that exist in AES. Static s-box allows data analyses attack and the eventual captures of sub-keys using inverse SubByte knowing inverse s-box. We propose a novel yet simple design and implementation with a very low overhead cost to existing AES in order to update s-box to a dynamic s-box depending on a variable sub-key at each round. This way, static data analysis of the program flow and data injection cannot affect the AES security.