CFP last date
20 May 2024
Reseach Article

Hybrid Architecture to overcome the Error Propagation Effect of AES

by B. Sarkar, C. T. Bhunia, U. Maulik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 17
Year of Publication: 2012
Authors: B. Sarkar, C. T. Bhunia, U. Maulik
10.5120/8131-1610

B. Sarkar, C. T. Bhunia, U. Maulik . Hybrid Architecture to overcome the Error Propagation Effect of AES. International Journal of Computer Applications. 51, 17 ( August 2012), 1-6. DOI=10.5120/8131-1610

@article{ 10.5120/8131-1610,
author = { B. Sarkar, C. T. Bhunia, U. Maulik },
title = { Hybrid Architecture to overcome the Error Propagation Effect of AES },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 17 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number17/8131-1610/ },
doi = { 10.5120/8131-1610 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:07.627353+05:30
%A B. Sarkar
%A C. T. Bhunia
%A U. Maulik
%T Hybrid Architecture to overcome the Error Propagation Effect of AES
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 17
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the recent past, AES (Advanced Encryption Standard) has been developed to replace DES (Data Encryption Standard) due to several reports of failure [1, 2] of security or key of DES. The replacement has aimed to augment the level of security mainly with the higher key size. Besides the higher level of security, AES has aimed to provide higher efficiency and better flexibility by means of encryption at different levels and with different block sizes [3]. AES, however, suffers from a major limitation owing to error propagation in the encryption process, which is undoubtedly a great research challenge. The AES encryption is done at several rounds of iteration. Each round of iteration has different input data and different key. The input data and the keys of different rounds are all generated from the original source data and the source key respectively. On the basis of this theory the input data and the keys at rounds follow a data path and a key path respectively. Any bit error at any round, if occurs either at the data path or at the key path, the effect propagates and results in remarkably large number of errors. The research [4, 5] reported this limitation of AES in their authoritative work. In literature, several studies have been made on this issue and several techniques are suggested to tackle the effect. In this paper, we have made extensive studies on Error Propagation Effect of AES algorithm (data path) and reviewed the solutions provided through an efficient hybrid method so that the error propagation effect of AES can be eradicated. Certainly, there are some assumptions and considerations that are stated in appropriate points of the discussion.

References
  1. A. Household et al. , "Computer Attack Trends Challenge Internet Security, Security and privacy", IEEE Computer Society, 2002.
  2. NIST, "Announcing the Advanced Encryption Standard (AES)", Federal Information Processing Standards Publication, No. 197, 2001.
  3. C. T. Bhunia, "Information Technology Network and Internet", New Age International publication, 2005.
  4. G. Bertoni et al. , "Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard", IEEE Transactions on Computers, vol. 52, no. 4, 2003.
  5. C. T. Bhunia et al. , Project Work on "AES Error Propagation", Indian School of Mines, India, 2004.
  6. G. Bertoni et al. , "A parity code Based Fault Detection for an implementation of The advanced encryption standard", Proc IEEE Intl. Symp. Defect and Fault tolerance in VLSI systems, 2002.
  7. B. Sarkar et al. , "Modified Redundancy based Technique — a New Approach to Combat Error Propagation Effect of AES", Springer Journal of Institution of Engineers (India) Series B, 2012, DOI: 10. 1007/s40031-012-0012-1.
  8. Williams, Ross N. , "A Painless Guide to LRC and CRC Error Detection Algorithms V3. 00", September 24, 1996. http://www. repairfaq. org/filipg/LINK/F_crc_v3. html. Retrieved on June 15, 2010.
  9. "Cheng Huang et al. , "Erasure Coding in Windows Azure Storage". http://www. google. co. in/url?sa=t&rct=j&q=benefit+of+lrc+check+code&source=web&cd=6&ved=0CFgQFjAF&url=https%3A%2F%2Fwww. usenix. org%2Fsystem%2Ffiles%2Fconference%2Fatc12%2Fatc12-final181_0. pdf&ei=1_YrUPCbI8iIrAfl6ID4Cg&usg=AFQjCNGG6JqHzdhe9gM5N8KNjODF2NfAoQ. Retrieved on July 5, 2012.
  10. Conflict Research Consortium, "Majority Rule Processes", International Online Training Program on Intractable Conflict. http://www. colorado. edu/conflict/peace/treatment/majority. htm. Retrieved on July 5, 2012.
  11. B. Sarkar et al. , "Approach towards realizing error propagation effect of AES and studies thereof", Int'l J BITM Transaction on EECC, Vol. 2, No. 1, 2010.
  12. C T Bhunia, New Approaches for Selective AES towards Tackling Error Propagation Effect of AES, Asian J of Information Technology, Pakistan, Vol 5, No. 9, pp 1017-1022, 2006.
  13. B. Sarkar et al. , "Study and Analysis of Error Propagation Effect of Advanced Encryption Standard", Int'l J HIT Transaction on ECCN, Vol. – 2, No. – 7, 2008.
  14. G. Bertoni et al. , "Fault Detection in the Advanced Encryption Standard," Proc. Conf. Massively Parallel Computing Systems (MPCS '02), pp. 92-97, 2002.
  15. G. Bertoni et al. , "On the Propagation of Faults and Their Detection in a Hardware Implementation of the Advanced Encryption Standard," Proc. Int'l Conf. Application-Specific Systems, Architectures, and Processors (ASAP '02), pp. 303-312, 2002.
  16. Tom Lookabaugh et al, "Selective Encryption for Consumer Applications", IEEE Communication Magazine, Vol 42, no 5, pp. 124-129, April'2004.
Index Terms

Computer Science
Information Sciences

Keywords

AES encryption decryption bit error error propagation Longitudinal Redundancy Check majority rule Selective encryption