2016
DOI: 10.1002/sec.1753
|View full text |Cite
|
Sign up to set email alerts
|

Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey

Abstract: Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Secure AODV routing protocol to detect and identify a black hole attacks using Outlier Detection Scheme is implemented, this method uses hop count calculation model [2]. Malicious node detection using heterogeneous cluster based routing protocol was proposed for enhancing network security [3]. K-means clustering based routing protocol is developed for providing routing security in MANET [4].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure AODV routing protocol to detect and identify a black hole attacks using Outlier Detection Scheme is implemented, this method uses hop count calculation model [2]. Malicious node detection using heterogeneous cluster based routing protocol was proposed for enhancing network security [3]. K-means clustering based routing protocol is developed for providing routing security in MANET [4].…”
Section: Related Workmentioning
confidence: 99%
“…Multi agent based IDS, was proposed to increasing the routing security of MANET [7]. A novel key management method for wireless sensor network was proposed for secure communication [8]. An energy efficient algorithm was implemented for minimizing the battery consumption of a mobile node [9].…”
Section: Related Workmentioning
confidence: 99%