Skip to main content
Top

2023 | OriginalPaper | Chapter

An Effective Protection Approach for Deceive Attacker in AES Attack

Authors : R. Shashank, E. Prabhu

Published in: Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, data security has gained much importance. Encryption has evolved as a solution and is now a necessary component of every information security system. A variety of processes are necessary to protect the shared data. The present research focuses on employing encryption to protect data as it travels across the internet. This paper proposes that the data being sent from sender to receiver in the network must be encrypted using the AES-128 encryption approach. Decryption techniques allow the recipient to access the original data. This study examines the methods for manipulating messages and data. Most of the time, these attacks substitute encrypted data with corrupted data, resulting in unwanted data. These data are included by attackers throughout RTL design, physical design layout level, and maybe manufacture levels. Hardware Trojans are the term for them. However, there is a countermeasure for every assault, and therefore in this work, a deception of attacker approach is proposed to enable data transaction.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 2:226–233 Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 2:226–233
2.
go back to reference Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Global J Comput SciTechnol Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Global J Comput SciTechnol
3.
go back to reference Sivaganesan D (2021) A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. J Trends Comput Sci Smart Technol (TCSST) 3(01):59–69CrossRef Sivaganesan D (2021) A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. J Trends Comput Sci Smart Technol (TCSST) 3(01):59–69CrossRef
4.
go back to reference Thomas D, Moorby P (2008) The Verilog® hardware description language. Springer Science Business Media Thomas D, Moorby P (2008) The Verilog® hardware description language. Springer Science Business Media
7.
go back to reference Krishna AV, Prabhu E (2022) Hardware trojan detection at behavioral level using inline assertions and verification using UVM. In: Smys S, Balas VE, Palanisamy R (eds) Inventive computation and information technologies, Lecture notes in networks and systems, vol 336. Springer, Singapore Krishna AV, Prabhu E (2022) Hardware trojan detection at behavioral level using inline assertions and verification using UVM. In: Smys S, Balas VE, Palanisamy R (eds) Inventive computation and information technologies, Lecture notes in networks and systems, vol 336. Springer, Singapore
8.
go back to reference Gowtham M, Harsha KS, Nikhil J, Eswar MS, Ramesh SR (2021) Hardware trojan detection using supervised machine learning. In: 2021 6th International conference on communication and electronics systems (ICCES), pp 1451–1456 Gowtham M, Harsha KS, Nikhil J, Eswar MS, Ramesh SR (2021) Hardware trojan detection using supervised machine learning. In: 2021 6th International conference on communication and electronics systems (ICCES), pp 1451–1456
11.
go back to reference Jin Y, Kupp N, Makris Y (2009) Experiences in hardware trojan design and implementation. In: 2009 IEEE international workshop on hardware-oriented security and trust, pp 50–57 Jin Y, Kupp N, Makris Y (2009) Experiences in hardware trojan design and implementation. In: 2009 IEEE international workshop on hardware-oriented security and trust, pp 50–57
12.
go back to reference Hemachand M, Prabhu E (2020) Secured netlist generation using obfuscation technique. J Crit Rev 7(4):878–881 Hemachand M, Prabhu E (2020) Secured netlist generation using obfuscation technique. J Crit Rev 7(4):878–881
16.
go back to reference Chakraborty RS et al. (2013) Hardware trojan insertion by direct modification of FPGA configuration bitstream. IEEE Des Test 30(2):45–54 Chakraborty RS et al. (2013) Hardware trojan insertion by direct modification of FPGA configuration bitstream. IEEE Des Test 30(2):45–54
Metadata
Title
An Effective Protection Approach for Deceive Attacker in AES Attack
Authors
R. Shashank
E. Prabhu
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-7753-4_37