Examples of weak AES implementation and attacks against them

With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime. This increase in cybercrime rate resulted in people paying more attention t...

Full description

Saved in:
Bibliographic Details
Main Author: Yeap, Ernest Zong Han
Other Authors: Tay Kian Boon
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156430
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime. This increase in cybercrime rate resulted in people paying more attention towards confidentiality in their data transmitted. With confidentiality being enforced, people can assume that the data sent across will be for the intended user. Unauthorised personnel will find it hard to understand the information captured since it is not meant for them. One way to ensure confidentiality is by using an encryption program. With the program, the user will be able to ensure the document will only be understood by the intended user. The basis of such program requires a strong cryptography algorithm and proper implementation. Internet user have been blindsided by program claiming the usage of a strong algorithm but did not pay attention to the way the algorithm is implemented. This study will talk about some of weakened implementation of a strong encryption algorithm and conduct attacks against it. After completing the attacks, suggestions will be given on ways to spot or avoid the use of these weakly implemented program. By reading this study, users can gain the knowledge of identifying potential weakly implemented program and avoid the use of such program.