Skip to main content

Questions tagged [aes]

AES (Advanced Encryption Standard) is a symmetrical block-cipher algorithm with a 128-bit block size, and key sizes of 128, 192 or 256 bits.

1 vote
0 answers
65 views

I am engaged in the translation of encrypted files. I have several files encrypted in the same way. The files consist of two parts: 48 byte header example - ...
Alba's user avatar
  • 11
1 vote
1 answer
149 views

We have a system where the file will be encrypted (AES) then signed (EcDSA) during build. At run-time, the rom code will verify the file (EcDSA), decrypt (AES), then boot using that file. Since ...
user1813123's user avatar
3 votes
0 answers
63 views

My goal is to build a simple as possible AES-based Deterministic Authenticated Encryption (DAE) scheme. If I look at the SIV scheme defined by Rogaway and Shrimpton, they need to define S2V to have ...
Ruggero's user avatar
  • 7,409
2 votes
1 answer
145 views

I am a high school student participating in a secure satellite communication idea competition. I am building a prototype to generate unpredictable encryption keys using ATECC608A (TRNG) and hardware ...
Tugra's user avatar
  • 21
2 votes
2 answers
163 views

When working with TDES, the "default" test key that I've always seen used is 0123456789ABCDEF FEDCBA9876543210. I've seen others, usually using a ...
Bobson's user avatar
  • 121
0 votes
1 answer
132 views

I'm writing an application that encrypts data with a shared key using AES in ECB mode. The level of security for this application isn't extremely high. But I do want to scramble the blocks before ...
P. Pascal's user avatar
3 votes
0 answers
116 views

I'm looking at using AES-256-GCM to encrypt data at rest (in a database) with logged-in user id's (among possibly other things) as the authenticated data. I'd like the application to (eventually) ...
ManRow's user avatar
  • 373
1 vote
2 answers
248 views

I'm writing a science fiction story involving highly classified data, stored and transmitted under extreme security constraints. I’d like to know what would be considered the most secure encryption ...
HawkDiogo's user avatar
0 votes
1 answer
137 views

I'm making an online Client-Server game where upon a client's connection a sessionKey is generated by the server and exchanged securely under TLS during authentication, so that the client can also ...
desynchedneo's user avatar
-3 votes
1 answer
161 views

I have idea. Generate random 256 numbers or permute in random way numbers from 0 to 255. Add second password. Generate subkeys from second password same way they generated from first. Every round use ...
W Nguyen's user avatar
5 votes
2 answers
614 views

This answer to a similar question on AES-GCM says that using a the hash of the combination of message and key as a nonce (left half bits of counter, as I understand it, for AES-CTR) would be OK, but ...
Harald's user avatar
  • 165
1 vote
2 answers
320 views

Let's assume we need to encrypt 100,000 files directly, where the file size ranges from very small to very large and encrypting needs to be performed using the AES-256, i.e. AES with a key size of 256 ...
Joseph D's user avatar
1 vote
0 answers
48 views

I've attempted to perform a template attack on TINYAES128. Plaintext and key are both 16 bytes and my attack targets each subkey (byte) separately. The AES implementation is mostly like the one ...
Roei's user avatar
  • 11
2 votes
3 answers
326 views

Everybody seems to rely happily on the set of Intel instructions on > 2010 CPUs to accelerate AES256 encryption. This might be a too naive question but, being the exact algorithms an industrial ...
Mephisto's user avatar
  • 163
1 vote
1 answer
88 views

I've been reading up on hardware reverse engineering, specifically in the context of FPGAs and how one might retrieve critical information like the contents of Lookup Tables (LUTs). After ...
ijjo99's user avatar
  • 11

15 30 50 per page
1
2 3 4 5
181