Examples of weak AES implementation and attacks against them

With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime. This increase in cybercrime rate resulted in people paying more attention t...

Full description

Saved in:
Bibliographic Details
Main Author: Yeap, Ernest Zong Han
Other Authors: Tay Kian Boon
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156430
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-156430
record_format dspace
spelling sg-ntu-dr.10356-1564302022-04-16T12:27:08Z Examples of weak AES implementation and attacks against them Yeap, Ernest Zong Han Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime. This increase in cybercrime rate resulted in people paying more attention towards confidentiality in their data transmitted. With confidentiality being enforced, people can assume that the data sent across will be for the intended user. Unauthorised personnel will find it hard to understand the information captured since it is not meant for them. One way to ensure confidentiality is by using an encryption program. With the program, the user will be able to ensure the document will only be understood by the intended user. The basis of such program requires a strong cryptography algorithm and proper implementation. Internet user have been blindsided by program claiming the usage of a strong algorithm but did not pay attention to the way the algorithm is implemented. This study will talk about some of weakened implementation of a strong encryption algorithm and conduct attacks against it. After completing the attacks, suggestions will be given on ways to spot or avoid the use of these weakly implemented program. By reading this study, users can gain the knowledge of identifying potential weakly implemented program and avoid the use of such program. Bachelor of Engineering (Computer Science) 2022-04-16T12:27:08Z 2022-04-16T12:27:08Z 2022 Final Year Project (FYP) Yeap, E. Z. H. (2022). Examples of weak AES implementation and attacks against them. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156430 https://hdl.handle.net/10356/156430 en SCSE21-0444 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics::Discrete mathematics::Cryptography
spellingShingle Science::Mathematics::Discrete mathematics::Cryptography
Yeap, Ernest Zong Han
Examples of weak AES implementation and attacks against them
description With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime. This increase in cybercrime rate resulted in people paying more attention towards confidentiality in their data transmitted. With confidentiality being enforced, people can assume that the data sent across will be for the intended user. Unauthorised personnel will find it hard to understand the information captured since it is not meant for them. One way to ensure confidentiality is by using an encryption program. With the program, the user will be able to ensure the document will only be understood by the intended user. The basis of such program requires a strong cryptography algorithm and proper implementation. Internet user have been blindsided by program claiming the usage of a strong algorithm but did not pay attention to the way the algorithm is implemented. This study will talk about some of weakened implementation of a strong encryption algorithm and conduct attacks against it. After completing the attacks, suggestions will be given on ways to spot or avoid the use of these weakly implemented program. By reading this study, users can gain the knowledge of identifying potential weakly implemented program and avoid the use of such program.
author2 Tay Kian Boon
author_facet Tay Kian Boon
Yeap, Ernest Zong Han
format Final Year Project
author Yeap, Ernest Zong Han
author_sort Yeap, Ernest Zong Han
title Examples of weak AES implementation and attacks against them
title_short Examples of weak AES implementation and attacks against them
title_full Examples of weak AES implementation and attacks against them
title_fullStr Examples of weak AES implementation and attacks against them
title_full_unstemmed Examples of weak AES implementation and attacks against them
title_sort examples of weak aes implementation and attacks against them
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/156430
_version_ 1731235722550050816