Attacks and countermeasures on AES and ECC

AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above.

[1]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[2]  Michael Rosing,et al.  Implementing elliptic curve cryptography , 1998 .

[3]  Dan Forsberg,et al.  LTE Security , 2010 .

[4]  Y. Shidama,et al.  Formal Verification of AES Using the Mizar Proof Checker , 2011 .

[5]  Alex Biryukov,et al.  Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds , 2010, IACR Cryptol. ePrint Arch..

[6]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .

[7]  Samant Khajuria,et al.  Implementation of Diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[8]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.