On-preventing and Mitigating of Leaking Secrets in AES By Side-Channel Attacks-Countermeasure
Discuss this preprint
Start a discussion What are Sciety discussions?Listed in
This article is not in any list yet, why not save it to one of your lists.Abstract
The advanced encryption standards (AES) are also a significant algorithm under the scope of modern cryptography to access sensitive information in other applications [1]. But its practical implementation is facing significant challenges because of the inherent flaws of side channel attack-SCA, which leverages on implementation specific information to attack safety. This paper examines methods of ensuring the Advanced Encryption Standard (AES) is resistant to side-channel attacks and at the same time, it has high throughput and efficiency. It particularly concentrates on Novel hybridization methods and countermeasures to resist side-channel analysis, so as to offer effective and strong security solutions to AES implementations. The includes-based approach incorporates a multi- faceted approach to counter side-channel attacks that involves both algorithmic modifications and the application of SCA- countermeasure defenses. The AES version (AES-Hybridization) that already was tested by rigorous testing with a NIST-statistical test costume of the National Institute of Standards and Technology, and that provides adherence to cryptographic standards. The results of the experiment, in comparison with the initial AEs, demonstrate an increase in the randomization level by 200 percent which will have the effect on the AES- Hybridization.