2018
DOI: 10.1088/1742-6596/1019/1/012008
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Encryption Standard with Galois Counter Mode using Field Programmable Gate Array.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…So, AES-256 which has a key length of 256 bits, supports the largest bit size and is virtually unbreakable by brute force based on today's computing standards, making it, to date, the strongest encryption standard. Even using a host of super-powered computers, cracking a 256-bit AES key would take longer than the assumed age of the universe [18][19][20][21][22][23][24][25][26].…”
Section: Choice Of Authentication Algorithmmentioning
confidence: 99%
“…So, AES-256 which has a key length of 256 bits, supports the largest bit size and is virtually unbreakable by brute force based on today's computing standards, making it, to date, the strongest encryption standard. Even using a host of super-powered computers, cracking a 256-bit AES key would take longer than the assumed age of the universe [18][19][20][21][22][23][24][25][26].…”
Section: Choice Of Authentication Algorithmmentioning
confidence: 99%
“…WPA3 is a subset and the latest improvement of the 802.11i security standard of WLAN technology for personal and enterprise networks. WPA3 enhances the encryption of wireless networks using a new encryption protocol called Galois Counter Mode Protocol (GCMP) with Advanced Encryption Standard (AES) [12]. In addition, WPA3 improves the authentication of wireless networks by dealing with Simultaneous Authentication of Equal (SAE is defined as a secure key establishment protocol) with a length key equal to 128 or 192 bits to submit stronger defenses against password guessing where WPA2 was dealt with pre-shared key (PSK).…”
Section: A the Proposed Model Of Wpa3mentioning
confidence: 99%
“…Initialization Vector (IV), additional authenticated data, secret key, and plaintext are used as input in 128-bit and give a 128-bit ciphertext and authentication tag. AES-GCM algorithm can encrypt or decrypt with a 128-bit or 192-bit of cipher key [12]. The algorithm that is adopted to provide the authentication and integrity in WPA3 is the hash message authentication code (HMAC).…”
Section: A the Proposed Model Of Wpa3mentioning
confidence: 99%
“…This may have resulted from the operation of the Galois/Counter Mode (GCM) block encryption. (17)(18)(19) In the GCM block encryption, the message authentication code (MAC) value should be added to the message, which requires 16 bytes to verify the identity. (20) When the message content is small, adding the MAC value is more likely to affect the transmission speed, resulting in a long time for the encryption process.…”
Section: Information Security Of Iotmentioning
confidence: 99%