AES加密标准及安全性分析

Zhengyi Lu
{"title":"AES加密标准及安全性分析","authors":"Zhengyi Lu","doi":"10.1117/12.2662564","DOIUrl":null,"url":null,"abstract":"AES has replaced DES to become a widely used encryption algorithm since 2000s. This paper may insight the basic theory of AES and safety analysis. In this paper, the whole process of AES encryption is described. The procedures of plaintext processing firstly, substituting bytes secondly, then shifting rows, mixing columns and adding round keys. AES-128 is taken as the study example in this paper to introduce the features and operating steps of AES. The construction and use of a simple S-box is also mentioned to help understand the procedure of substituting bytes. Safety analysis of AES is also taken into consideration to test AES’s resistance against different kinds of attacks. The results show that AES is free from brute force attack with time security analysis. AES with 128 or more bits of key length can resist square attacks according to reviews on research. A way of differential cryptanalysis attack with concrete operating steps is introduced as a potential attack method against AES encryption standard. The paper also casts view on an improved AES algorithm to increase efficiency and security proposed by other research.","PeriodicalId":220312,"journal":{"name":"International Symposium on Computer Engineering and Intelligent Communications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis on AES encryption standard and safety\",\"authors\":\"Zhengyi Lu\",\"doi\":\"10.1117/12.2662564\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"AES has replaced DES to become a widely used encryption algorithm since 2000s. This paper may insight the basic theory of AES and safety analysis. In this paper, the whole process of AES encryption is described. The procedures of plaintext processing firstly, substituting bytes secondly, then shifting rows, mixing columns and adding round keys. AES-128 is taken as the study example in this paper to introduce the features and operating steps of AES. The construction and use of a simple S-box is also mentioned to help understand the procedure of substituting bytes. Safety analysis of AES is also taken into consideration to test AES’s resistance against different kinds of attacks. The results show that AES is free from brute force attack with time security analysis. AES with 128 or more bits of key length can resist square attacks according to reviews on research. A way of differential cryptanalysis attack with concrete operating steps is introduced as a potential attack method against AES encryption standard. The paper also casts view on an improved AES algorithm to increase efficiency and security proposed by other research.\",\"PeriodicalId\":220312,\"journal\":{\"name\":\"International Symposium on Computer Engineering and Intelligent Communications\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Symposium on Computer Engineering and Intelligent Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2662564\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Computer Engineering and Intelligent Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2662564","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

自2000年以来,AES取代DES成为广泛使用的加密算法。本文介绍了AES的基本理论和安全性分析。本文描述了AES加密的整个过程。首先是明文处理,其次是替换字节,然后是移行、混列和添加圆键。本文以AES-128为例,介绍了AES的特点和操作步骤。还提到了一个简单s盒的构造和使用,以帮助理解替换字节的过程。对AES进行了安全性分析,测试了AES对各种攻击的抵抗能力。结果表明,AES不受暴力破解的影响。根据对研究的回顾,密钥长度为128位或更多位的AES可以抵御平方攻击。作为一种针对AES加密标准的潜在攻击方法,提出了一种具有具体操作步骤的差分密码分析攻击方法。本文还介绍了其他研究提出的一种改进的AES算法,以提高效率和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis on AES encryption standard and safety
AES has replaced DES to become a widely used encryption algorithm since 2000s. This paper may insight the basic theory of AES and safety analysis. In this paper, the whole process of AES encryption is described. The procedures of plaintext processing firstly, substituting bytes secondly, then shifting rows, mixing columns and adding round keys. AES-128 is taken as the study example in this paper to introduce the features and operating steps of AES. The construction and use of a simple S-box is also mentioned to help understand the procedure of substituting bytes. Safety analysis of AES is also taken into consideration to test AES’s resistance against different kinds of attacks. The results show that AES is free from brute force attack with time security analysis. AES with 128 or more bits of key length can resist square attacks according to reviews on research. A way of differential cryptanalysis attack with concrete operating steps is introduced as a potential attack method against AES encryption standard. The paper also casts view on an improved AES algorithm to increase efficiency and security proposed by other research.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信