About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16–17, 2024, Proceedings, Part I

Research Article

AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-81168-5_5,
        author={Ankush Soni and Sanjay K. Sahay and Parit Mehta},
        title={AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3},
        proceedings={Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16--17, 2024, Proceedings, Part I},
        proceedings_a={BROADNETS},
        year={2025},
        month={2},
        keywords={Advanced Encryption Standard Sub-keys Secure Hash Algorithm-3 IoT Devices},
        doi={10.1007/978-3-031-81168-5_5}
    }
    
  • Ankush Soni
    Sanjay K. Sahay
    Parit Mehta
    Year: 2025
    AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3
    BROADNETS
    Springer
    DOI: 10.1007/978-3-031-81168-5_5
Ankush Soni1, Sanjay K. Sahay1,*, Parit Mehta1
  • 1: Department of Computer Science and Information Systems, BITS, Pilani
*Contact email: ssahay@goa.bits-pilani.ac.in

Abstract

Advanced Encryption Standard (AES) is one of the most widely used symmetric cipher for the confidentiality of data. Also it is used for other security services, viz. integrity, authentication and key establishment. However, recently, authors have shown some weakness in the generation of sub-keys in AES, e.g. bit leakage attack, etc. Also, AES sub-keys are generated sequentially, which is an overhead, especially for resource-constrained devices. Therefore, we propose and investigate a novel encryption AESHA3, which uses sub-keys generated by Secure Hash Algorithm-3 (SHA3). The output of SHA3 is one-way and highly non-linear, and random. The experimental analysis shows that the average time taken for generating the sub-keys to be used for encrypting the data using our approach i.e. AESHA3 is(\sim )1300 times faster than the sub-key generated by the standard AES. Accordingly, we find that AESHA3 will be very relevant not only in terms of security but also it will save the resources in IoT devices. We investigated AESHA3 in Intel Core i7, 6th Generation processor and Raspberry Pi 4B and found that up to two MB data encryption is very significant, and lesser the data size, more the resource saving compared to AES.

Keywords
Advanced Encryption Standard Sub-keys Secure Hash Algorithm-3 IoT Devices
Published
2025-02-07
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-81168-5_5
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL