Examples of weak AES implementation and attacks against them
With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime. This increase in cybercrime rate resulted in people paying more attention t...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156430 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-156430 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1564302022-04-16T12:27:08Z Examples of weak AES implementation and attacks against them Yeap, Ernest Zong Han Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime. This increase in cybercrime rate resulted in people paying more attention towards confidentiality in their data transmitted. With confidentiality being enforced, people can assume that the data sent across will be for the intended user. Unauthorised personnel will find it hard to understand the information captured since it is not meant for them. One way to ensure confidentiality is by using an encryption program. With the program, the user will be able to ensure the document will only be understood by the intended user. The basis of such program requires a strong cryptography algorithm and proper implementation. Internet user have been blindsided by program claiming the usage of a strong algorithm but did not pay attention to the way the algorithm is implemented. This study will talk about some of weakened implementation of a strong encryption algorithm and conduct attacks against it. After completing the attacks, suggestions will be given on ways to spot or avoid the use of these weakly implemented program. By reading this study, users can gain the knowledge of identifying potential weakly implemented program and avoid the use of such program. Bachelor of Engineering (Computer Science) 2022-04-16T12:27:08Z 2022-04-16T12:27:08Z 2022 Final Year Project (FYP) Yeap, E. Z. H. (2022). Examples of weak AES implementation and attacks against them. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156430 https://hdl.handle.net/10356/156430 en SCSE21-0444 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics::Discrete mathematics::Cryptography |
spellingShingle |
Science::Mathematics::Discrete mathematics::Cryptography Yeap, Ernest Zong Han Examples of weak AES implementation and attacks against them |
description |
With more people getting into the internet world, the amount of traffic generated has increased tremendously. This surge in internet traffic caught the eyes of malicious hacker and contributed to the growth in cybercrime.
This increase in cybercrime rate resulted in people paying more attention towards confidentiality in their data transmitted. With confidentiality being enforced, people can assume that the data sent across will be for the intended user. Unauthorised personnel will find it hard to understand the information captured since it is not meant for them.
One way to ensure confidentiality is by using an encryption program. With the program, the user will be able to ensure the document will only be understood by the intended user. The basis of such program requires a strong cryptography algorithm and proper implementation. Internet user have been blindsided by program claiming the usage of a strong algorithm but did not pay attention to the way the algorithm is implemented.
This study will talk about some of weakened implementation of a strong encryption algorithm and conduct attacks against it. After completing the attacks, suggestions will be given on ways to spot or avoid the use of these weakly implemented program. By reading this study, users can gain the knowledge of identifying potential weakly implemented program and avoid the use of such program. |
author2 |
Tay Kian Boon |
author_facet |
Tay Kian Boon Yeap, Ernest Zong Han |
format |
Final Year Project |
author |
Yeap, Ernest Zong Han |
author_sort |
Yeap, Ernest Zong Han |
title |
Examples of weak AES implementation and attacks against them |
title_short |
Examples of weak AES implementation and attacks against them |
title_full |
Examples of weak AES implementation and attacks against them |
title_fullStr |
Examples of weak AES implementation and attacks against them |
title_full_unstemmed |
Examples of weak AES implementation and attacks against them |
title_sort |
examples of weak aes implementation and attacks against them |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/156430 |
_version_ |
1731235722550050816 |