Questions tagged [aes]
AES (Advanced Encryption Standard) is a symmetrical block-cipher algorithm with a 128-bit block size, and key sizes of 128, 192 or 256 bits.
2,706 questions
1
vote
0
answers
65
views
How to determine the algorithm used to generate a 48-byte header for encrypted files? [closed]
I am engaged in the translation of encrypted files. I have several files encrypted in the same way.
The files consist of two parts:
48 byte header example - ...
1
vote
1
answer
149
views
which AES variant for encrypted then signed files?
We have a system where the file will be encrypted (AES) then signed (EcDSA) during build.
At run-time, the rom code will verify the file (EcDSA), decrypt (AES), then boot using that file.
Since ...
3
votes
0
answers
63
views
Simplifying AES-SIV if no AAD is present
My goal is to build a simple as possible AES-based Deterministic Authenticated Encryption (DAE) scheme.
If I look at the SIV scheme defined by Rogaway and Shrimpton, they need to define S2V to have ...
2
votes
1
answer
145
views
Advice on Student Project: Hybrid TRNG + PQC + AES-256 Encryption with ESP32 Communication
I am a high school student participating in a secure satellite communication idea competition. I am building a prototype to generate unpredictable encryption keys using ATECC608A (TRNG) and hardware ...
2
votes
2
answers
163
views
Is there an AES equivalent to the "standard" TDES test key?
When working with TDES, the "default" test key that I've always seen used is 0123456789ABCDEF FEDCBA9876543210. I've seen others, usually using a ...
0
votes
1
answer
132
views
Is XOR-scrambling with a seeded RNG a secure alternative to standard AES modes?
I'm writing an application that encrypts data with a shared key using AES in ECB mode. The level of security for this application isn't extremely high. But I do want to scramble the blocks before ...
3
votes
0
answers
116
views
Circumventing birthday bounds in AES-GCM?
I'm looking at using AES-256-GCM to encrypt data at rest (in a database) with logged-in user id's (among possibly other things) as the authenticated data.
I'd like the application to (eventually) ...
1
vote
2
answers
248
views
What would be the most secure encryption system possible to protect “top-level international data”, even against quantum computers?
I'm writing a science fiction story involving highly classified data, stored and transmitted under extreme security constraints.
I’d like to know what would be considered the most secure encryption ...
0
votes
1
answer
137
views
Using AES GCM with IV [prefix + counter], can I just change the prefix instead of changing the whole AES key if the counter overflows?
I'm making an online Client-Server game where upon a client's connection a sessionKey is generated by the server and exchanged securely under TLS during authentication, so that the client can also ...
-3
votes
1
answer
161
views
AES modification
I have idea. Generate random 256 numbers or permute in random way numbers from 0 to 255. Add second password. Generate subkeys from second password same way they generated from first. Every round use ...
5
votes
2
answers
614
views
Is it insecure to use a good hash function on the data to derive the nonce for AES-CTR
This answer to a similar question on AES-GCM says that using a the hash of the combination of message and key as a nonce (left half bits of counter, as I understand it, for AES-CTR) would be OK, but ...
1
vote
2
answers
320
views
If encrypting a large number of files, would a unique AES key per file be beneficial?
Let's assume we need to encrypt 100,000 files directly, where the file size ranges from very small to very large and encrypting needs to be performed using the AES-256, i.e. AES with a key size of 256 ...
1
vote
0
answers
48
views
Inconsistency in TINYAES128 template attack results
I've attempted to perform a template attack on TINYAES128. Plaintext and key are both 16 bytes and my attack targets each subkey (byte) separately.
The AES implementation is mostly like the one ...
2
votes
3
answers
326
views
Who has checked that AES-NI produces the expected results? (i.e. the exact same as software-only AES encryption)
Everybody seems to rely happily on the set of Intel instructions on > 2010 CPUs to accelerate AES256 encryption.
This might be a too naive question but, being the exact algorithms an industrial ...
1
vote
1
answer
88
views
Hardware Reverse Engineering FPGA LUTs for AES Analysis
I've been reading up on hardware reverse engineering, specifically in the context of FPGAs and how one might retrieve critical information like the contents of Lookup Tables (LUTs).
After ...