Novel Approaches to Protecting Block Ciphers by Distributing Round Keys
- Resource Type
- Conference
- Authors
- Jung, Taeyoung; Kim, Jaein; Park, Junyoung; Yim, Kangbin
- Source
- 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on. :812-816 Mar, 2015
- Subject
- Communication, Networking and Broadcast Technologies
Computing and Processing
Encryption
Secure storage
Software
Resource management
Memory management
Block cipher; Master key; Round key; Memory hacking
- Language
- ISSN
- 1550-445X
2332-5658
Security storage products that need to provide real-time encryption and decryption usually store the prescheduled round keys in memory to support high-speed operation. An encryption key that is resident in memory is vulnerable, which may be exposed by key hacking tools such as "aeskeyfinder." This paper proposes a method to improve security by spreading the location of each round key when the pre-scheduled round keys are stored in memory and make the keys not exposed by the hacking tools.