Parallel Java is a parallel programming API whose goals are (1)
-Since its release in November 2001, the Advanced Encryption Standard (NIST FIPS-197) has been the subject of extensive cryptanalysis research. The importance of this research has intensified since AES was named, in 2003, by NSA as a Type-1 Suite B Encryption Algorithm (CNSSP-15). As such, AES is now authorized to protect classified and unclassified national security systems and information. This paper provides an overview of current cryptanalysis research on the AES cryptographic algorithm. Discussion is provided on the impact by each technique to the strength of the algorithm in national security applications. The paper is concluded with an attempt at a forecast of the usable life of AES in these applications. Keywords-Advanced Encryption Standard; AES; Cryptanalysis; Side Channel Attacks INTRODUCTIONIn 2003, the National Security Agency took the unprecedented step of approving a public-domain encryption algorithm, AES, for classified information processing. Prior to this milestone, all encryption algorithms approved by the NSA for classified processing were, themselves, classified. The strength of any good encryption algorithm is not enhanced by holding the design as secret. In fact, a public domain encryption standard is subject to continuous, vigilant, expert cryptanalysis. Any breakthroughs will very likely be available to users as well as their adversaries at the same time.In consumer applications, this isn't as much of a problem, but in military communication applications it can be disastrous. Here, the adversary can have national intelligence agency level resources and can exploit vulnerabilities as soon as they are identified. If practical vulnerabilities are found, there will be a period of reduced confidence until a new algorithm can be installed.It is prudent for users and providers of military communications equipment to stay abreast of the progress and trends on cryptanalysis of AES. Facilitating this process is the objective of this paper.Section 2 presents a summary of the past and current areas of research on cryptanalysis of the AES. This section is divided into 5 subsections. The first discusses attacks that pre-existed AES and were addressed as part of its design. The second discusses progress in the new area of algebraic attacks. The third discusses progress on SAT solver and hybrid attacks. Subsection 4 discusses the progress made in side-channel cryptanalysis. Subsection 5 presents a summary of related-key vulnerabilities and distinguishing attacks on AES. These are particularly relevant when AES is used in applications other than traffic encryption (such as hash functions). Section 3 provides discussion of the current strength of AES in national security applications. A forecast of the usable life of AES in these applications is attempted. The paper is concluded in Section 4. CURRENT AREAS OF RESEARCH 2.1Pre-Existing Attacks 2.1.1 Linear Cryptanalysis Linear cryptanalysis exploits approximate linear relationships that exist between inputs and outputs of a function block [1]. In ...
Abstract-Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both confidentiality and data integrity. There are many AE algorithms in existence today. However, they are often far from ideal in terms of efficiency and ease of use. For this reason, there is ongoing effort to develop new AE algorithms that are secure, efficient, and easy to use.The sponge construction is a relatively new cryptographic primitive that has gained popularity since the sponge-based KECCAK algorithm won the SHA-3 hashing competition. The duplex construction, which is closely related to the sponge, provides promising potential for secure and efficient authenticated encryption.In this paper we introduce a novel authenticated encryption algorithm based on the duplex construction that is targeted for hardware implementation. We provide explicit customization guidelines for users who desire unique authenticated encryption solutions within our security margins. Our substitution step uses 16 × 16 AES-like S-boxes which are novel because they are the largest bijective S-boxes to be used by an encryption scheme in the literature and are still efficiently implementable in both hardware and software.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.