scholarly journals Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Alexander DeTrano ◽  
Naghmeh Karimi ◽  
Ramesh Karri ◽  
Xiaofei Guo ◽  
Claude Carlet ◽  
...  

Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

2020 ◽  
Vol 1 (1) ◽  
pp. 11-22
Author(s):  
Asaad A. Hani

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method for the most part depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.


Author(s):  
Huda Najeeb

The goal of encryption voice is to ensure the preservation of the conversation details and not to allow anyone to tamper with or see it. This conversation is either secret or very private; no one can understand the substance of that information or messages only authorized persons who have own secret key. The best method to protect the voice message from unauthorized persons is to use both cryptography and steganography. This paper reviews the Advanced Encryption Standard (AES) algorithm used for encrypting voice message and  the Least Signification Bit steganography (LSB) used for embedding encrypted voice message with related key in color image without impacting the content and quality of it. After hiding a secret voice in an image, Stego image is created then is sent to the recipient. The mean square error (MSE) and the signal-to-noise ratio (PSNR) is calculated to measure the quality of the sent image. The findings of the research are that the stego image cannot be distinguished by the naked eye from the original cover image when the bit value is 1 or 2 and thus we reach the goal to cover the presence of a hidden sound inside.


Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1168
Author(s):  
Amira S. El Batouty ◽  
Hania H. Farag ◽  
Amr A. Mokhtar ◽  
El-Sayed A. El-Badawy ◽  
Moustafa H. Aly

Radio Frequency Identification (RFID) technology is widely utilized by businesses, organizations and wireless communication systems. RFID technology is secured using different ways of data encryption, e.g., Advanced Encryption Standard (AES). The Substitution Box (S-Box) is the core of AES. In this paper, a new algorithm is proposed to generate a modified S-Box with new keys, specifically a key and plaintext-dependent S-Box using an improved RC4 encryption algorithm with Logistic Chaotic Maps (LCM). The strength of the proposed S-Box is tested throughout the paper, and compared against the state-of-the-art S-Box implementations, namely, the static S-Box, dynamic S-box, KSA and PRGA S-Box, and RC4 S-Boxes with Henon chaotic maps. The comparison between the state-of-the-art S-Boxes and the proposed S-Box demonstrates that the use of the Logistic Chaotic Map increases the security of the S-Box and makes the differential and linear cryptography more sturdy. In particular, using the strict avalanche test, we demonstrate that the proposed S-Box improves the security by achieving a cipher text bit-flip ratio of 0.4765, which is closer to 0.5 (where half the bits are flipped), while maintaining a minimum elapsed time of 19 milliseconds for encryption and decryption.


Author(s):  
Lauren De Meyer ◽  
Oscar Reparaz ◽  
Begül Bilgin

Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box using the tower-field decomposition. On the other hand, splitting sensitive variables in a multiplicative way is more amenable for the computation of the AES S-box, as noted by Akkar and Giraud. However, multiplicative masking needs to be implemented carefully not to be vulnerable to first-order DPA with a zero-value power model. Up to now, sound higher-order multiplicative masking schemes have been implemented only in software. In this work, we demonstrate the first hardware implementation of AES using multiplicative masks. The method is tailored to be secure even if the underlying gates are not ideal and glitches occur in the circuit. We detail the design process of first- and second-order secure AES-128 cores, which result in the smallest die area to date among previous state-of-the-art masked AES implementations with comparable randomness cost and latency. The first- and second-order masked implementations improve resp. 29% and 18% over these designs. We deploy our construction on a Spartan-6 FPGA and perform a side-channel evaluation. No leakage is detected with up to 50 million traces for both our first- and second-order implementation. For the latter, this holds both for univariate and bivariate analysis.


2020 ◽  
Vol 39 (3) ◽  
pp. 4313-4318
Author(s):  
A. Anjalin Sweatha ◽  
K. Mohaideen Pitchai

In cryptography the block ciphers are the mostly used symmetric algorithms. In the existing system the standard S-Box of Advanced Encryption Standard(AES) is performed using the irreducible polynomial equation in table form known as look-up tables(LUTs). For more security purposes, second-order reversible cellular automata based S-box is created. The security aspects of the S-Box used in the AES algorithm are evaluated using cryptographic properties like Strict Avalanche Criteria, Non-Linearity, Entropy, and Common Immunity Bias. The design of S-Box using second-order reversible Cellular Automata is better concerning security and dynamic aspect as compared to the classical S-boxes used Advanced Encryption Standard.


2021 ◽  
Author(s):  
R. Sornalatha ◽  
N. Janakiraman ◽  
K. Balamurugan ◽  
Arun Kumar Sivaraman ◽  
Rajiv Vincent ◽  
...  

In this work, we obtain an area proficient composite field arithmetic Advanced Encryption Standard (AES) Substitution (S) byte and its inverse logic design. The size of this design is calculated by the number of gates used for hardware implementation. Most of the existing AES Substitution box hardware implementation uses separate Substitution byte and its inverse hardware structures. But we implement the both in the same module and a control signal is used to select the substitution byte for encryption operation and its inverse for the decryption operation. By comparing the gate utilization of the previous AES S–Box implementation, we reduced the gate utilization up to 5% that is we take only 78 EX-OR gates and 36 AND gates for implementing the both Substitution byte and its inverse. While implementing an AES algorithm in circuitry or programming, it is liable to be detected by hackers using any one of the side channel attacks. Data to be added with a random bit sequence to prevent from the above mentioned side channel attacks.


2020 ◽  
Vol 9 (1) ◽  
pp. 2214-2218

The Advanced Encryption Standard (AES) algorithm is available in a wide scope of encryption packages and is the single straightforwardly accessible cipher insisted by the National Security Agency (NSA), The Rijndael S-box is a substitution box S-Box assumes a significant job in the AES algorithm security. The quality of S-Box relies upon the plan and mathematical developments. Our paper gives an outline of AES S-Box investigation, the paper finds that algebraic attack is the most security gap of AES S-Box, likewise give a thought regarding distinctive past research to improve the static Sconfines that has been utilized AES, to upgrade the quality of AES Performance by shocking the best S-box.


1997 ◽  
Vol 36 (04/05) ◽  
pp. 315-318 ◽  
Author(s):  
K. Momose ◽  
K. Komiya ◽  
A. Uchiyama

Abstract:The relationship between chromatically modulated stimuli and visual evoked potentials (VEPs) was considered. VEPs of normal subjects elicited by chromatically modulated stimuli were measured under several color adaptations, and their binary kernels were estimated. Up to the second-order, binary kernels obtained from VEPs were so characteristic that the VEP-chromatic modulation system showed second-order nonlinearity. First-order binary kernels depended on the color of the stimulus and adaptation, whereas second-order kernels showed almost no difference. This result indicates that the waveforms of first-order binary kernels reflect perceived color (hue). This supports the suggestion that kernels of VEPs include color responses, and could be used as a probe with which to examine the color visual system.


2017 ◽  
Vol 9 (3) ◽  
pp. 17-30
Author(s):  
Kelly James Clark

In Branden Thornhill-Miller and Peter Millican’s challenging and provocative essay, we hear a considerably longer, more scholarly and less melodic rendition of John Lennon’s catchy tune—without religion, or at least without first-order supernaturalisms (the kinds of religion we find in the world), there’d be significantly less intra-group violence. First-order supernaturalist beliefs, as defined by Thornhill-Miller and Peter Millican (hereafter M&M), are “beliefs that claim unique authority for some particular religious tradition in preference to all others” (3). According to M&M, first-order supernaturalist beliefs are exclusivist, dogmatic, empirically unsupported, and irrational. Moreover, again according to M&M, we have perfectly natural explanations of the causes that underlie such beliefs (they seem to conceive of such natural explanations as debunking explanations). They then make a case for second-order supernaturalism, “which maintains that the universe in general, and the religious sensitivities of humanity in particular, have been formed by supernatural powers working through natural processes” (3). Second-order supernaturalism is a kind of theism, more closely akin to deism than, say, Christianity or Buddhism. It is, as such, universal (according to contemporary psychology of religion), empirically supported (according to philosophy in the form of the Fine-Tuning Argument), and beneficial (and so justified pragmatically). With respect to its pragmatic value, second-order supernaturalism, according to M&M, gets the good(s) of religion (cooperation, trust, etc) without its bad(s) (conflict and violence). Second-order supernaturalism is thus rational (and possibly true) and inconducive to violence. In this paper, I will examine just one small but important part of M&M’s argument: the claim that (first-order) religion is a primary motivator of violence and that its elimination would eliminate or curtail a great deal of violence in the world. Imagine, they say, no religion, too.Janusz Salamon offers a friendly extension or clarification of M&M’s second-order theism, one that I think, with emendations, has promise. He argues that the core of first-order religions, the belief that Ultimate Reality is the Ultimate Good (agatheism), is rational (agreeing that their particular claims are not) and, if widely conceded and endorsed by adherents of first-order religions, would reduce conflict in the world.While I favor the virtue of intellectual humility endorsed in both papers, I will argue contra M&M that (a) belief in first-order religion is not a primary motivator of conflict and violence (and so eliminating first-order religion won’t reduce violence). Second, partly contra Salamon, who I think is half right (but not half wrong), I will argue that (b) the religious resources for compassion can and should come from within both the particular (often exclusivist) and the universal (agatheistic) aspects of religious beliefs. Finally, I will argue that (c) both are guilty, as I am, of the philosopher’s obsession with belief. 


2009 ◽  
Vol 74 (1) ◽  
pp. 43-55 ◽  
Author(s):  
Dennis N. Kevill ◽  
Byoung-Chun Park ◽  
Jin Burm Kyong

The kinetics of nucleophilic substitution reactions of 1-(phenoxycarbonyl)pyridinium ions, prepared with the essentially non-nucleophilic/non-basic fluoroborate as the counterion, have been studied using up to 1.60 M methanol in acetonitrile as solvent and under solvolytic conditions in 2,2,2-trifluoroethan-1-ol (TFE) and its mixtures with water. Under the non- solvolytic conditions, the parent and three pyridine-ring-substituted derivatives were studied. Both second-order (first-order in methanol) and third-order (second-order in methanol) kinetic contributions were observed. In the solvolysis studies, since solvent ionizing power values were almost constant over the range of aqueous TFE studied, a Grunwald–Winstein equation treatment of the specific rates of solvolysis for the parent and the 4-methoxy derivative could be carried out in terms of variations in solvent nucleophilicity, and an appreciable sensitivity to changes in solvent nucleophilicity was found.


Sign in / Sign up

Export Citation Format

Share Document