Advertisement

Researching on AES Algorithm Based on Software Reverse Engineering

  • Qingjun Yuan
  • Siqi LuEmail author
  • Zongbo Zhang
  • Xi Chen
Conference paper
  • 2 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1143)

Abstract

As one of today’s mainstream encryption algorithms, AES has the characteristics of rapid computing speed, strong intensity of algorithm, and high safety performance, and it has been widely used in all kinds of software. During the ten-year research process, most people tried to crack the algorithm from the perspective of mathematics. From the angle of software reverse and according to the encryption in practical use, this article puts forward the corresponding attack strategy and safeguard measures for AES algorithm through the reverse analysis on three different types of software, during which we compared the AES code.

Keywords

AES algorithm Software reverse engineering Attack strategy 

References

  1. 1.
    Daor, J., Daemen, J., Rijmen, V.: AES Proposal. Rijndael (1998)Google Scholar
  2. 2.
    Kumarverma, H., Singh, R.K.: Performance analysis of RC6, twofish and rijndael block cipher algorithms. Int. J. Comput. Appl. 42(16), 1–7 (2012)Google Scholar
  3. 3.
    Sajadieh, M., Mirzaei, A., Mala, H., Rijmen, V.: A new counting method to bound the number of active S-boxes in Rijndael and 3DGoogle Scholar
  4. 4.
    Canfora, G., Penta, M.D., Cerulo, L.: Achievements and challenges in software reverse engineering. Commun. ACM 54(4), 142–151 (2011)CrossRefGoogle Scholar
  5. 5.
    Bergmayr, A., Bruneliere, H., Cabot, J. et al.: fREX: fUML-based reverse engineering of executable behavior for software dynamic analysis. In: IEEE/ACM, International Workshop on Modeling in Software Engineering, pp. 20–26 (2016)Google Scholar
  6. 6.
    Altigani, A., Abdelmagid, M., Barry, B.: Analyzing the performance of the advanced encryption standard block cipher modes of operation: highlighting the national institute of standards and technology recommendations. Indian J. Sci. Technol. 9(28) (2016)Google Scholar
  7. 7.
    Moradi, A., Oswald, D., Paar, C. et al.: Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II:facilitating blackbox analysis using software reverse-engineering. In: ACM/SIGDA International Symposium on Field Programmable Gate Arrays. ACM, pp. 91–100 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.PLA Strategic Support Force Information Engineering UniversityZhengzhouChina
  2. 2.Henan Key Laboratory of Network Cryptography TechnologyZhengzhouChina

Personalised recommendations