Open Access
Subscription Access
Open Access
Subscription Access
Modified AES with Random S Box Generation to Overcome the Side Channel Assaults Using Cloud
Subscribe/Renew Journal
Development of any communication system with secure and complex cryptographic algorithms highly depends on concepts of data security which is crucial in the current technological world. The security and complexity of the cryptography algorithms need to get increased by randomization of secret keys. To overcome the issues associated to data security and for improvising it during encryption and decryption process over the encrypting device, a novel Secure Side Channel Assault Prevention (SSCAP) approach has been projected which will eliminate outflow of side channel messages and also provides effective security over the encrypting device. An effective Enriched AES (E-AES) encryption algorithm is proposed to reduce the side channel attack; the modified algorithm in this research shows its improvement in the Generation of Random Multiple S - Box (GRM S-Box) which makes it hard to the attacks to break the text which is in encrypted form. Our novel SSCAP approach also improves the security over the original information; it widely minimizes the leakage of the side channel information. Attackers cannot easily get a clue about the proposed S-Box Generation technique. Our E-AES algorithm will be implemented in cloud environment thereby improving the cloud security. The proposed SSCAP approach is judged against the existing security based algorithms on the scale of encryption and decryption time, time taken for generating the key, and performance. The proposed work proves to outperform over all other methods used in the past.
Keywords
Encryption, Decryption, AES Algorithm, Side Channel Attack, Random S Box.
Subscription
Login to verify subscription
User
Font Size
Information
- Michael, M., Godfrey and Mohammad Zulkernine, “Preventing Cache-Based Side-Channel Attacks in a Cloud Environment”, IEEE Transactions on Cloud Computing, Vol. 2, No. 4, pp. 395-408, 2014.
- Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser and Ruby B. Lee, “Last-Level Cache Side-Channel Attacks are Practical”, Proceedings of IEEE Symposium on Security and Privacy, pp. 605-622, 2015.
- Yang Li, Kazuo Ohta and Kazuo Sakiyama, “New Fault-Based Side-Channel Attack using Fault Sensitivity”, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, pp. 88-97, 2012
- Charles R Harrell and Ken Tumay, “Promodel Tutorial”, Proceedings of 24th Conference on Winter Simulation, pp. 405-410, 1992.
- Suresh Chari, Josyula R. Rao and Pankaj Rohatgi, “Template Attacks”, Proceedings of 4th International Workshop Cryptographic Hardware and Embedded Systems, Vol. 2523, pp. 13-28, 2002.
- Itai Dinur, Orr Dunkelman and Adi Shamir, “Improved attacks on full GOST”, Proceedings of 19th International Workshop Fast Software Encryption, Vol. 7549, pp. 9-28, 2012.
- Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu and Keke Ji, “MDASCA : An Enhanced Algebraic Side Channel Attack for Error Tolerance and New Leakage model Exploitation”, Proceedings of 3rd International Workshop Constructive Side Channel Analysis and Secure Design, Vol. 7275, pp. 231-248, 2012.
- Asif Shahab, Faisal Shafait and Andreas Dengel, “ICDAR 2011 Robust Reading Competition Challenge2: Reading Text in Scene Images”, Proceedings of International Conference on Document Analysis and Recognition, pp. 1491-1496, 2011.
Abstract Views: 289
PDF Views: 3