关于AES算法的替换方法

L. Scripcariu, P. Matasaru
{"title":"关于AES算法的替换方法","authors":"L. Scripcariu, P. Matasaru","doi":"10.1109/ISSCS.2013.6651172","DOIUrl":null,"url":null,"abstract":"This paper is focused on the weakness of the Advanced Encryption Standard (AES) provided by the substitution step of the algorithm, which replaces each input data byte with a fix value provided by a static substitution box (S-box) [1]. Efficiently attacks on software programs secured by AES, are concentrated on whitening the S-box, in order to compromise the encryption key and the private information [2]. We propose an algebraic substitution method which dynamically modifies the “S-box”, based on a key sequence and a mathematic function operating on the Galois Field with 8-bit elements. The algorithm will be more robust under cryptographic attacks and the security of the system will be considerably improved.","PeriodicalId":260263,"journal":{"name":"International Symposium on Signals, Circuits and Systems ISSCS2013","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"On the substitution method of the AES algorithm\",\"authors\":\"L. Scripcariu, P. Matasaru\",\"doi\":\"10.1109/ISSCS.2013.6651172\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper is focused on the weakness of the Advanced Encryption Standard (AES) provided by the substitution step of the algorithm, which replaces each input data byte with a fix value provided by a static substitution box (S-box) [1]. Efficiently attacks on software programs secured by AES, are concentrated on whitening the S-box, in order to compromise the encryption key and the private information [2]. We propose an algebraic substitution method which dynamically modifies the “S-box”, based on a key sequence and a mathematic function operating on the Galois Field with 8-bit elements. The algorithm will be more robust under cryptographic attacks and the security of the system will be considerably improved.\",\"PeriodicalId\":260263,\"journal\":{\"name\":\"International Symposium on Signals, Circuits and Systems ISSCS2013\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Symposium on Signals, Circuits and Systems ISSCS2013\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSCS.2013.6651172\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Signals, Circuits and Systems ISSCS2013","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSCS.2013.6651172","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

本文主要针对算法的替换步骤提供的高级加密标准AES (Advanced Encryption Standard, AES)的弱点,AES将每个输入数据字节替换为静态替换盒(S-box)提供的固定值[1]。对采用AES保护的软件程序的有效攻击,主要集中在对S-box进行白化,以破坏加密密钥和隐私信息[2]。本文提出了一种基于密钥序列和作用于伽罗瓦域的8位元数学函数的动态修改“s盒”的代数替换方法。该算法在加密攻击下具有更强的鲁棒性,大大提高了系统的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On the substitution method of the AES algorithm
This paper is focused on the weakness of the Advanced Encryption Standard (AES) provided by the substitution step of the algorithm, which replaces each input data byte with a fix value provided by a static substitution box (S-box) [1]. Efficiently attacks on software programs secured by AES, are concentrated on whitening the S-box, in order to compromise the encryption key and the private information [2]. We propose an algebraic substitution method which dynamically modifies the “S-box”, based on a key sequence and a mathematic function operating on the Galois Field with 8-bit elements. The algorithm will be more robust under cryptographic attacks and the security of the system will be considerably improved.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信