{"title":"浅谈高级加密标准AES的安全性","authors":"Mohamed Boussif","doi":"10.1109/iceast55249.2022.9826324","DOIUrl":null,"url":null,"abstract":"WhatsApp, Signal, VeraCrypt, 7-zip, and WinZip use AES (Advanced Encryption Standard) to encrypt data in unsafe communications or storage. Moreover, it is implemented in many processors such as Westmere and Jaguar. Therefore, it is essential to provide a security analysis of this encryption system. This paper presents cryptanalysis for AES in encrypting blocks and multimedia data. The study is for all AES modes, i.e., ECB mode abbreviation of Electronic Code Book, CBC mode abbreviation of Cipher Block Chaining, CFB mode abbreviation of Cipher Feedback, OFB mode abbreviation of Output Feedback, and CTR mode abbreviation of Counter. Several analyses are provided for only block encryption as passwords and multimedia data such as audio, videos, and images. Foremother, we study its runtime by comparing it with other encryption algorithms in the same hardware. Results show all types of attacks can break AES and attacks that AES can confront.","PeriodicalId":441430,"journal":{"name":"2022 8th International Conference on Engineering, Applied Sciences, and Technology (ICEAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"On The Security of Advanced Encryption Standard (AES)\",\"authors\":\"Mohamed Boussif\",\"doi\":\"10.1109/iceast55249.2022.9826324\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"WhatsApp, Signal, VeraCrypt, 7-zip, and WinZip use AES (Advanced Encryption Standard) to encrypt data in unsafe communications or storage. Moreover, it is implemented in many processors such as Westmere and Jaguar. Therefore, it is essential to provide a security analysis of this encryption system. This paper presents cryptanalysis for AES in encrypting blocks and multimedia data. The study is for all AES modes, i.e., ECB mode abbreviation of Electronic Code Book, CBC mode abbreviation of Cipher Block Chaining, CFB mode abbreviation of Cipher Feedback, OFB mode abbreviation of Output Feedback, and CTR mode abbreviation of Counter. Several analyses are provided for only block encryption as passwords and multimedia data such as audio, videos, and images. Foremother, we study its runtime by comparing it with other encryption algorithms in the same hardware. Results show all types of attacks can break AES and attacks that AES can confront.\",\"PeriodicalId\":441430,\"journal\":{\"name\":\"2022 8th International Conference on Engineering, Applied Sciences, and Technology (ICEAST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 8th International Conference on Engineering, Applied Sciences, and Technology (ICEAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iceast55249.2022.9826324\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Engineering, Applied Sciences, and Technology (ICEAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iceast55249.2022.9826324","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On The Security of Advanced Encryption Standard (AES)
WhatsApp, Signal, VeraCrypt, 7-zip, and WinZip use AES (Advanced Encryption Standard) to encrypt data in unsafe communications or storage. Moreover, it is implemented in many processors such as Westmere and Jaguar. Therefore, it is essential to provide a security analysis of this encryption system. This paper presents cryptanalysis for AES in encrypting blocks and multimedia data. The study is for all AES modes, i.e., ECB mode abbreviation of Electronic Code Book, CBC mode abbreviation of Cipher Block Chaining, CFB mode abbreviation of Cipher Feedback, OFB mode abbreviation of Output Feedback, and CTR mode abbreviation of Counter. Several analyses are provided for only block encryption as passwords and multimedia data such as audio, videos, and images. Foremother, we study its runtime by comparing it with other encryption algorithms in the same hardware. Results show all types of attacks can break AES and attacks that AES can confront.