{"title":"AES加密标准及安全性分析","authors":"Zhengyi Lu","doi":"10.1117/12.2662564","DOIUrl":null,"url":null,"abstract":"AES has replaced DES to become a widely used encryption algorithm since 2000s. This paper may insight the basic theory of AES and safety analysis. In this paper, the whole process of AES encryption is described. The procedures of plaintext processing firstly, substituting bytes secondly, then shifting rows, mixing columns and adding round keys. AES-128 is taken as the study example in this paper to introduce the features and operating steps of AES. The construction and use of a simple S-box is also mentioned to help understand the procedure of substituting bytes. Safety analysis of AES is also taken into consideration to test AES’s resistance against different kinds of attacks. The results show that AES is free from brute force attack with time security analysis. AES with 128 or more bits of key length can resist square attacks according to reviews on research. A way of differential cryptanalysis attack with concrete operating steps is introduced as a potential attack method against AES encryption standard. The paper also casts view on an improved AES algorithm to increase efficiency and security proposed by other research.","PeriodicalId":220312,"journal":{"name":"International Symposium on Computer Engineering and Intelligent Communications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis on AES encryption standard and safety\",\"authors\":\"Zhengyi Lu\",\"doi\":\"10.1117/12.2662564\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"AES has replaced DES to become a widely used encryption algorithm since 2000s. This paper may insight the basic theory of AES and safety analysis. In this paper, the whole process of AES encryption is described. The procedures of plaintext processing firstly, substituting bytes secondly, then shifting rows, mixing columns and adding round keys. AES-128 is taken as the study example in this paper to introduce the features and operating steps of AES. The construction and use of a simple S-box is also mentioned to help understand the procedure of substituting bytes. Safety analysis of AES is also taken into consideration to test AES’s resistance against different kinds of attacks. The results show that AES is free from brute force attack with time security analysis. AES with 128 or more bits of key length can resist square attacks according to reviews on research. A way of differential cryptanalysis attack with concrete operating steps is introduced as a potential attack method against AES encryption standard. The paper also casts view on an improved AES algorithm to increase efficiency and security proposed by other research.\",\"PeriodicalId\":220312,\"journal\":{\"name\":\"International Symposium on Computer Engineering and Intelligent Communications\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Symposium on Computer Engineering and Intelligent Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2662564\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Computer Engineering and Intelligent Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2662564","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
AES has replaced DES to become a widely used encryption algorithm since 2000s. This paper may insight the basic theory of AES and safety analysis. In this paper, the whole process of AES encryption is described. The procedures of plaintext processing firstly, substituting bytes secondly, then shifting rows, mixing columns and adding round keys. AES-128 is taken as the study example in this paper to introduce the features and operating steps of AES. The construction and use of a simple S-box is also mentioned to help understand the procedure of substituting bytes. Safety analysis of AES is also taken into consideration to test AES’s resistance against different kinds of attacks. The results show that AES is free from brute force attack with time security analysis. AES with 128 or more bits of key length can resist square attacks according to reviews on research. A way of differential cryptanalysis attack with concrete operating steps is introduced as a potential attack method against AES encryption standard. The paper also casts view on an improved AES algorithm to increase efficiency and security proposed by other research.