نتایج جستجو برای: aes 128

تعداد نتایج: 29461  

2013
Juliane Krämer Dmitry Nedospasov Alexander Schlösser Jean-Pierre Seifert

This work presents the first differential side channel analysis to exploit photonic emissions. We call this form of analysis Differential Photonic Emission Analysis (DPEA). After identifying a suitable area for the analysis, our system captures photonic emissions from switching transistors and relates them to the program running in the chip. The subsequent differential analysis reveals the secr...

2016
Markus Grassl Brandon Langenberg Martin Rötteler Rainer Steinwandt

We present quantum circuits to implement an exhaustive key search for the Advanced Encryption Standard (AES) and analyze the quantum resources required to carry out such an attack. We consider the overall circuit size, the number of qubits, and the circuit depth as measures for the cost of the presented quantum algorithms. Throughout, we focus on Clifford+T gates as the underlying fault-toleran...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2023

We study a new transistor-level side-channel leakage caused by charges trapped in between stacked transistors namely residual electric (RECs). Building models is important designing countermeasures against attacks (SCAs). The conventional work showed that even measurable with local electromagnetic measurement. One example the current-path leak [1], [2]: an attacker can distinguish number of cur...

Journal: :CoRR 2013
Sugata Sanyal Parthasarathy P. Iyer

In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications and services that run on distributed network using virtualized resources and acce...

2005
Stefan Mangard Norbert Pramstaller Elisabeth Oswald

During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of these countermeasures in practice, we have designed and manufactured an ASIC. The chip features an unmasked and two masked AES-128 encryption engines that can be attacked independently. In addition to conventional DPA atta...

2005
Jakob Jonsson Matthew J. B. Robshaw

RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogonal to the RSA-KEM construction and the RSA-KEM proof of security models the KDF as a random oracle. In this paper we present an AES-based KDF that has been explicitly designed so that we can appeal to currently held ...

2016
Madhusudhan Aithal

This paper presents comparative study on one of the popular cryptographic algorithms AES algorithm, implemented using CUDA on GPU and on CPU. In present day scenario the AES algorithm suffers from very high CPU resource consumption, latency and low throughput. The AES cipher calculation is performed in blocks, with each block of size 128 bits. For a given plaintext, repetitions of transformatio...

2013
Ali Farmani Hossein Balazadeh Bahar

This paper describes the implementation of a low power and high-speed encryption algorithm with high throughput for encrypting the image. Therefore, we select a highly secured symmetric key encryption algorithm AES(Advanced Encryption Standard), in order to decrease the power using retiming and glitch and operand isolation techniques in four stages, control unit based on logic gates, optimal de...

2013
Jignesh R Patel Rajesh S. Bansode Vikas Kaul

The fast evolution of digital data exchange has forced the information security to be of much important in data storage and transmission. As large amount of data is transmitted over the network, it is preliminary to secure all types of data before sending them. The problem with AES, most extensively used encryption is that it uses many multi variant equations which are linear in nature. Thus it...

2011
JeaHoon Park

© 2011 ETRI Journal, Volume 33, Number 3, June 2011 This paper presents a practical differential fault analysis method for the faulty Advanced Encryption Standard (AES) with a reduced round by means of a semi-invasive fault injection. To verify our proposal, we implement the AES software on the ATmega128 microcontroller as recommended in the standard document FIPS 197. We reduce the number of r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید