Automatic Detection and Decryption of AES Using Dynamic Analysis

نویسندگان

چکیده

Abstract In this paper we propose a set of algorithms that can automatically detect the use AES and recover both encryption key plaintext, assuming control code flow encrypting program, e.g., when an application is performing without user’s permission. The first algorithm makes fact monitor accesses to S-Box deduce desired data from these accesses; approach suitable software-based implementations, naïve optimized. To demonstrate feasibility designed tool which implements for Microsoft Windows running on Intel x86 architecture. has been successfully tested against applications using different cryptographic libraries common user applications. We also discuss options recovering same hardware-assisted implementations Intel-compatible architectures are used.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AES Encryption and Decryption Using Direct3D 10 API

Current video cards (GPUs – Graphics Processing Units) are very programmable, have become much more powerful than the CPUs and they are very affordable. In this paper, we present an implementation for the AES algorithm using Direct3D 10 certified GPUs. The graphics API Direct3D 10 is the first version that allows the use of integer operations, making from the traditional GPUs (that works only w...

متن کامل

An image encryption and decryption using AES algorithm

Abstract— These In today’s world data security is the major problem which is to be face. In order to secure data during communication, data storage and transmission we use Advance encryption standard(AES). AES is a symmetric block cipher intended to replace DES for commercial applications.it uses 128-bit block size and a key size of 128, 192, or 256 bits. The AES algorithmis use to secure data ...

متن کامل

Shared Architecture for Encryption/Decryption of AES

Security has become an increasingly important feature with the growth of electronic communication. The Symmetric in which the same key value is used in both the encryption and decryption calculations are becoming more popular. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. This standard is based on the Rijnda...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

Accelerating Encryption/decryption Using Gpu’s for Aes Algorithm

Technology has done a great deal for changing the way we live and do business today. We can see the use of computers from the vegetable shop to large scale businesses. In this fast moving world we need something essential for fast computation. So here comes the Graphics Processing unit for fastest computation through means of its parallel architecture. Along with the popular use of computer, in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SN computer science

سال: 2022

ISSN: ['2661-8907', '2662-995X']

DOI: https://doi.org/10.1007/s42979-022-01222-w