Analysis of Venkaiah et al.'s AES Design
نویسنده
چکیده
This paper describes impossible differential (ID) attacks on an AES variant designed by Venkaiah et al.. They claim that their cipher has improved resistance to ID attacks due to a new MixColumns matrix with a branch number 4, which is smaller than that of the original AES. We argue against this statement. The contributions of this paper include ID distinguishers for Venkaiah et al.’s cipher, and a discussion of the susceptibility of such variants to impossible differential and other modern cryptanalytic techniques.
منابع مشابه
Cryptanalysis of the Xiao - Lai White-Box AES Implementation
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. prese...
متن کاملAn Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient sidechannel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in terms of protection order. Therefore, we revisit the private circuits scheme of Ishai et al. [13] which is known to be vulnerable to glitches. We d...
متن کاملFrom Verilog to Bluespec: Tales of an AES Implementation for FPGAs
In this paper I present a combined Verilog and Bluespec implementation of the Advanced Encryption Standard (AES) for FPGAs. This solution relies on the fastest AES implementation for FPGAs, presented by Drimer et al. Bluespec is a versatile HDL, allowing an easy parametrization of a large design. Based on this property I show the simple use of two different AES implementations (AES32 and AES128...
متن کاملAnother Nail in the Coffin of White-Box AES Implementations
The goal of white-box cryptography is to design implementations of common cryptographic algorithm (e.g. AES) that remain secure against an attacker with full control of the implementation and execution environment. This concept was put forward a decade ago by Chow et al. (SAC 2002) who proposed the first white-box implementation of AES. Since then, several works have been dedicated to the desig...
متن کاملA Tutorial on White-box AES
White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a white-box attack context. This is an attack model where all details of the implementation are completely visible to an attacker: not only do they see input and output, they see every intermediate comput...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 9 شماره
صفحات -
تاریخ انتشار 2009