Skip to main content

Questions tagged [aes]

AES (Advanced Encryption Standard) is a symmetrical block-cipher algorithm with a 128-bit block size, and key sizes of 128, 192 or 256 bits.

Filter by
Sorted by
Tagged with
3 votes
1 answer
77 views

This could be related to any cipher, but this is specific so some AES hardware. In this hardware, a 128-bit random number is exchanged, as one does, between hosts. Due to a hardware quirk, the last ...
b degnan's user avatar
  • 5,363
1 vote
0 answers
68 views

I am engaged in the translation of encrypted files. I have several files encrypted in the same way. The files consist of two parts: 48 byte header example - ...
Alba's user avatar
  • 11
1 vote
1 answer
151 views

We have a system where the file will be encrypted (AES) then signed (EcDSA) during build. At run-time, the rom code will verify the file (EcDSA), decrypt (AES), then boot using that file. Since ...
user1813123's user avatar
3 votes
0 answers
63 views

My goal is to build a simple as possible AES-based Deterministic Authenticated Encryption (DAE) scheme. If I look at the SIV scheme defined by Rogaway and Shrimpton, they need to define S2V to have ...
Ruggero's user avatar
  • 7,399
2 votes
1 answer
146 views

I am a high school student participating in a secure satellite communication idea competition. I am building a prototype to generate unpredictable encryption keys using ATECC608A (TRNG) and hardware ...
Tugra's user avatar
  • 21
2 votes
2 answers
164 views

When working with TDES, the "default" test key that I've always seen used is 0123456789ABCDEF FEDCBA9876543210. I've seen others, usually using a ...
Bobson's user avatar
  • 121
0 votes
1 answer
134 views

I'm writing an application that encrypts data with a shared key using AES in ECB mode. The level of security for this application isn't extremely high. But I do want to scramble the blocks before ...
P. Pascal's user avatar
3 votes
0 answers
116 views

I'm looking at using AES-256-GCM to encrypt data at rest (in a database) with logged-in user id's (among possibly other things) as the authenticated data. I'd like the application to (eventually) ...
ManRow's user avatar
  • 373
1 vote
2 answers
250 views

I'm writing a science fiction story involving highly classified data, stored and transmitted under extreme security constraints. I’d like to know what would be considered the most secure encryption ...
HawkDiogo's user avatar
0 votes
1 answer
137 views

I'm making an online Client-Server game where upon a client's connection a sessionKey is generated by the server and exchanged securely under TLS during authentication, so that the client can also ...
desynchedneo's user avatar
-3 votes
1 answer
162 views

I have idea. Generate random 256 numbers or permute in random way numbers from 0 to 255. Add second password. Generate subkeys from second password same way they generated from first. Every round use ...
W Nguyen's user avatar
5 votes
2 answers
615 views

This answer to a similar question on AES-GCM says that using a the hash of the combination of message and key as a nonce (left half bits of counter, as I understand it, for AES-CTR) would be OK, but ...
Harald's user avatar
  • 165
1 vote
2 answers
321 views

Let's assume we need to encrypt 100,000 files directly, where the file size ranges from very small to very large and encrypting needs to be performed using the AES-256, i.e. AES with a key size of 256 ...
Joseph D's user avatar
1 vote
0 answers
48 views

I've attempted to perform a template attack on TINYAES128. Plaintext and key are both 16 bytes and my attack targets each subkey (byte) separately. The AES implementation is mostly like the one ...
Roei's user avatar
  • 11
2 votes
3 answers
329 views

Everybody seems to rely happily on the set of Intel instructions on > 2010 CPUs to accelerate AES256 encryption. This might be a too naive question but, being the exact algorithms an industrial ...
Mephisto's user avatar
  • 163

15 30 50 per page
1
2 3 4 5
181