Skip to main content

Researching on AES Algorithm Based on Software Reverse Engineering

  • Conference paper
  • First Online:
  • 1093 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1143))

Abstract

As one of today’s mainstream encryption algorithms, AES has the characteristics of rapid computing speed, strong intensity of algorithm, and high safety performance, and it has been widely used in all kinds of software. During the ten-year research process, most people tried to crack the algorithm from the perspective of mathematics. From the angle of software reverse and according to the encryption in practical use, this article puts forward the corresponding attack strategy and safeguard measures for AES algorithm through the reverse analysis on three different types of software, during which we compared the AES code.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Daor, J., Daemen, J., Rijmen, V.: AES Proposal. Rijndael (1998)

    Google Scholar 

  2. Kumarverma, H., Singh, R.K.: Performance analysis of RC6, twofish and rijndael block cipher algorithms. Int. J. Comput. Appl. 42(16), 1–7 (2012)

    Google Scholar 

  3. Sajadieh, M., Mirzaei, A., Mala, H., Rijmen, V.: A new counting method to bound the number of active S-boxes in Rijndael and 3D

    Google Scholar 

  4. Canfora, G., Penta, M.D., Cerulo, L.: Achievements and challenges in software reverse engineering. Commun. ACM 54(4), 142–151 (2011)

    Article  Google Scholar 

  5. Bergmayr, A., Bruneliere, H., Cabot, J. et al.: fREX: fUML-based reverse engineering of executable behavior for software dynamic analysis. In: IEEE/ACM, International Workshop on Modeling in Software Engineering, pp. 20–26 (2016)

    Google Scholar 

  6. Altigani, A., Abdelmagid, M., Barry, B.: Analyzing the performance of the advanced encryption standard block cipher modes of operation: highlighting the national institute of standards and technology recommendations. Indian J. Sci. Technol. 9(28) (2016)

    Google Scholar 

  7. Moradi, A., Oswald, D., Paar, C. et al.: Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II:facilitating blackbox analysis using software reverse-engineering. In: ACM/SIGDA International Symposium on Field Programmable Gate Arrays. ACM, pp. 91–100 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siqi Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yuan, Q., Lu, S., Zhang, Z., Chen, X. (2021). Researching on AES Algorithm Based on Software Reverse Engineering. In: Liu, Q., Liu, X., Li, L., Zhou, H., Zhao, HH. (eds) Proceedings of the 9th International Conference on Computer Engineering and Networks . Advances in Intelligent Systems and Computing, vol 1143. Springer, Singapore. https://doi.org/10.1007/978-981-15-3753-0_65

Download citation

Publish with us

Policies and ethics