Internal Re-keying Based Modified AES

DOI: 10.17485/ijst/v18i1.2012 Publication Date: 2025-01-22T16:24:40Z
ABSTRACT
Objectives: Masking and re-keying are two major countermeasures against the Power Side Channel Analysis attacks. Re-keying has either secret sharing overhead or needs to be used in synchronization. The Advanced Encryption System (AES) been modified proposed scheme uses without need for random synchronized communication. research a AES validated its effectiveness with AES. Methods: This study proposes modifying then implementing it as software encryption using Python. As modified, should also match strength further Attack. Avalanche parameter is check solution strength. A data set of 10000, 50000, 100000 records were generated test avalanche effect. existing compared. Findings: results indicate that effect both remains equivalent supplied dataset. To analyze further, distribution analyzed randomness checked Shannon entropy found provides 0.5% more Hence, fulfills benchmark criteria Novelty: algorithm part plain text generate round key making resultant unique can re-generated from ciphertext original schedule on decryption side, not needed. Keywords: Masking, Random Sharing Overhead, Differential (DPA), AES, Effect,
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (0)
CITATIONS (0)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....