Breaking AES Encryption Model
written by
Wolfgang Christian
The Breaking the AES Cipher Model encrypts a plaintext message using AES encryption and attempts to break this encryption using a plaintext attack. The attacker (Eve) obtains both the plaintext and the cyphered text for a message between two people, Alice and Bob, and systematically encrypts the plaintext using the AES encryption function with all possible keys until the function's output matches the known cyphered text. Eve starts with a key, feeds the key and the plaintext into the encryption function, and checks whether the cyphered text is equal to the known value. If so, Eve has found the correct key. Otherwise, Eve systematically changes the key until she is successful. If the key is small or if Eve knows some of the key, the computational task may be manageable. This model displays the computation time using both a sequential and a parallel do-loop implementation of the plaintext attack. The model is designed to show how Java performs standard AES encryption and to test the speedup and sizeup of parallel computation using multi-core processors.
The Breaking the AES Cipher Model was created using the Easy Java Simulations (EJS) modeling tool. It is distributed as a ready-to-run (compiled) Java archive. Double clicking the model's jar file will run the simulation if Java is installed. Please note that this resource requires at least version 1.6 of Java.
ComPADRE is beta testing Citation Styles!
Record Link
<a href="https://www.compadre.org/portal/items/detail.cfm?ID=11730">Christian, Wolfgang. "Breaking AES Encryption Model." Version 1.0.</a>
AIP Format
W. Christian, Computer Program BREAKING AES ENCRYPTION MODEL, Version 1.0 (2012), WWW Document, (https://www.compadre.org/Repository/document/ServeFile.cfm?ID=11730&DocID=2609).
AJP/PRST-PER
W. Christian, Computer Program BREAKING AES ENCRYPTION MODEL, Version 1.0 (2012), <https://www.compadre.org/Repository/document/ServeFile.cfm?ID=11730&DocID=2609>.
APA Format
Christian, W. (2012). Breaking AES Encryption Model (Version 1.0) [Computer software]. Retrieved September 11, 2024, from https://www.compadre.org/Repository/document/ServeFile.cfm?ID=11730&DocID=2609
Chicago Format
Christian, Wolfgang. "Breaking AES Encryption Model." Version 1.0. https://www.compadre.org/Repository/document/ServeFile.cfm?ID=11730&DocID=2609 (accessed 11 September 2024).
MLA Format
Christian, Wolfgang. Breaking AES Encryption Model. Vers. 1.0. Computer software. 2012. Java 1.6. 11 Sep. 2024 <https://www.compadre.org/Repository/document/ServeFile.cfm?ID=11730&DocID=2609>.
BibTeX Export Format
@misc{
Author = "Wolfgang Christian",
Title = {Breaking AES Encryption Model},
Month = {February},
Year = {2012}
}
Refer Export Format
%A Wolfgang Christian %T Breaking AES Encryption Model %D February 18, 2012 %U https://www.compadre.org/Repository/document/ServeFile.cfm?ID=11730&DocID=2609 %O 1.0 %O application/java
EndNote Export Format
%0 Computer Program %A Christian, Wolfgang %D February 18, 2012 %T Breaking AES Encryption Model %7 1.0 %8 February 18, 2012 %U https://www.compadre.org/Repository/document/ServeFile.cfm?ID=11730&DocID=2609 Disclaimer: ComPADRE offers citation styles as a guide only. We cannot offer interpretations about citations as this is an automated procedure. Please refer to the style manuals in the Citation Source Information area for clarifications.
Citation Source Information
The AIP Style presented is based on information from the AIP Style Manual. The APA Style presented is based on information from APA Style.org: Electronic References. The Chicago Style presented is based on information from Examples of Chicago-Style Documentation. The MLA Style presented is based on information from the MLA FAQ. This resource is stored in a shared folder. You must login to access shared folders. Breaking AES Encryption Model:
Is Based On
Easy Java Simulations Modeling and Authoring Tool
The Easy Java Simulations Modeling and Authoring Tool is needed to explore the computational model used in the Breaking AES Encryption Model. relation by Wolfgang ChristianKnow of another related resource? Login to relate this resource to it. |
SupplementsContributeRelated MaterialsSimilar Materials |