In this article, I explain how AES encryption works and how the algorithm is implemented.

  • vzq
    link
    fedilink
    arrow-up
    29
    ·
    edit-2
    3 months ago

    deleted by creator

    • addie@feddit.uk
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      The side channel resistance includes such matters as ensuring that the cypher takes the same amount of time, regardless of the key, but also such super-sneaky insights as the amount of power used to run the cypher, which can be measured from the CPU temperature. Every bit of the cypher that you can be sure of makes it easier to guess the rest. And even if you coded this algorithm in assembly, the CPU will interpret it as microcode and run that, potentially leaving you vulnerable - this is not straightforward stuff.

      Like vzq says, implementing this properly is for a cross-disciplinary team of experts in their fields.

    • Marek Knápek@programming.dev
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      Yes, but (there is always a but) it does not apply if you implement off-line encryption. Meaning no on-line service encrypting / decrypting attacker provided data (such as SSL / TLS / HTTPS). Meaning if you are running the cipher on your own computer with your own keys / plaintexts / ciphertexts. There is nobody to snoop time differences or power usage differences when using different key / different ciphertext. Then I would suggest this is fine. The only one who can attack you is yourself. In fact, I implemented AES from scratch in C89 language, this source code is at the same time compatible with C++14 constexpr evaluation mode. I also implemented the Serpent cipher, Serpent was an AES candidate back then when there were no AES and Rijndael was not AES yet. The code is on my GitHub page.