
Research Article
AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3
@INPROCEEDINGS{10.1007/978-3-031-81168-5_5, author={Ankush Soni and Sanjay K. Sahay and Parit Mehta}, title={AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3}, proceedings={Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16--17, 2024, Proceedings, Part I}, proceedings_a={BROADNETS}, year={2025}, month={2}, keywords={Advanced Encryption Standard Sub-keys Secure Hash Algorithm-3 IoT Devices}, doi={10.1007/978-3-031-81168-5_5} }
- Ankush Soni
Sanjay K. Sahay
Parit Mehta
Year: 2025
AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3
BROADNETS
Springer
DOI: 10.1007/978-3-031-81168-5_5
Abstract
Advanced Encryption Standard (AES) is one of the most widely used symmetric cipher for the confidentiality of data. Also it is used for other security services, viz. integrity, authentication and key establishment. However, recently, authors have shown some weakness in the generation of sub-keys in AES, e.g. bit leakage attack, etc. Also, AES sub-keys are generated sequentially, which is an overhead, especially for resource-constrained devices. Therefore, we propose and investigate a novel encryption AESHA3, which uses sub-keys generated by Secure Hash Algorithm-3 (SHA3). The output of SHA3 is one-way and highly non-linear, and random. The experimental analysis shows that the average time taken for generating the sub-keys to be used for encrypting the data using our approach i.e. AESHA3 is(\sim )1300 times faster than the sub-key generated by the standard AES. Accordingly, we find that AESHA3 will be very relevant not only in terms of security but also it will save the resources in IoT devices. We investigated AESHA3 in Intel Core i7, 6th Generation processor and Raspberry Pi 4B and found that up to two MB data encryption is very significant, and lesser the data size, more the resource saving compared to AES.