Robust First Two Rounds Access Driven Cache Timing Attack on AES
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
Advances on access-driven cache attacks on AES
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Related-Key Collision Attack of AES_256
IPTC '10 Proceedings of the 2010 International Symposium on Intelligence Information Processing and Trusted Computing
Combined Fault and Side-Channel Attacks on the AES Key Schedule
FDTC '12 Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography
Fine tuning the advanced encryption standard (AES)
Proceedings of the Fifth International Conference on Security of Information and Networks
Hi-index | 0.00 |
The purpose of this research is to update AES with a dynamic s-box in order to counter the timing vulnerabilities that exist in AES. Static s-box allows data analyses attack and the eventual captures of sub-keys using inverse SubByte knowing inverse s-box. We propose a novel yet simple design and implementation with a very low overhead cost to existing AES in order to update s-box to a dynamic s-box depending on a variable sub-key at each round. This way, static data analysis of the program flow and data injection cannot affect the AES security.