Title :
Novel Approaches to Protecting Block Ciphers by Distributing Round Keys
Author :
Taeyoung Jung ; Jaein Kim ; Junyoung Park ; Kangbin Yim
Author_Institution :
Dept. of Inf. Security Eng., Soonchunhyang Univ., Asan, South Korea
Abstract :
Security storage products that need to provide real-time encryption and decryption usually store the prescheduled round keys in memory to support high-speed operation. An encryption key that is resident in memory is vulnerable, which may be exposed by key hacking tools such as "aeskeyfinder." This paper proposes a method to improve security by spreading the location of each round key when the pre-scheduled round keys are stored in memory and make the keys not exposed by the hacking tools.
Keywords :
cryptography; telecommunication security; aeskeyfinder; block ciphers; decryption; encryption key; key hacking tools; real-time encryption; round keys; security storage products; Encryption; Memory management; Resource management; Secure storage; Software; Block cipher; Master key; Round key; Memory hacking;
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on
Conference_Location :
Gwangiu
Print_ISBN :
978-1-4799-7904-2
DOI :
10.1109/AINA.2015.273