Computer Program Detail Page
This ComPADRE record has not been chosen for inclusion into the PhysTEC collection. If you feel this record should be included, you may contact the editor using our feedback form.
written by Wolfgang Christian
The Breaking the AES Cipher Model encrypts a plaintext message using AES encryption and attempts to break this encryption using a plaintext attack. The attacker (Eve) obtains both the plaintext and the cyphered text for a message between two people, Alice and Bob, and systematically encrypts the plaintext using the AES encryption function with all possible keys until the function's output matches the known cyphered text. Eve starts with a key, feeds the key and the plaintext into the encryption function, and checks whether the cyphered text is equal to the known value. If so, Eve has found the correct key. Otherwise, Eve systematically changes the key until she is successful. If the key is small or if Eve knows some of the key, the computational task may be manageable. This model displays the computation time using both a sequential and a parallel do-loop implementation of the plaintext attack. The model is designed to show how Java performs standard AES encryption and to test the speedup and sizeup of parallel computation using multi-core processors.
The Breaking the AES Cipher Model was created using the Easy Java Simulations (EJS) modeling tool. It is distributed as a ready-to-run (compiled) Java archive. Double clicking the model's jar file will run the simulation if Java is installed.
Please note that this resource requires at least version 1.6 of Java.
View the source code document attached to this resource
ComPADRE is beta testing Citation Styles!
Disclaimer: ComPADRE offers citation styles as a guide only. We cannot offer interpretations about citations as this is an automated procedure. Please refer to the style manuals in the Citation Source Information area for clarifications.
Citation Source Information
The APA Style presented is based on information from APA Style.org: Electronic References.
The Chicago Style presented is based on information from Examples of Chicago-Style Documentation.
The MLA Style presented is based on information from the MLA FAQ.
Breaking AES Encryption Model:
Is Based On Easy Java Simulations Modeling and Authoring Tool
The Easy Java Simulations Modeling and Authoring Tool is needed to explore the computational model used in the Breaking AES Encryption Model.relation by Wolfgang Christian
Know of another related resource? Login to relate this resource to it.