SRFGSears Receivables Financing Group, Inc. (Delaware)
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
In Figure 4, it is shown that the words are generated using SRFG rather than using simple XOR operation.
For AES-256, using SRFG with two variables and t expression terms, the complexity of key recovery with any two random faulty byte is calculated as
The time comparison results show that using the SRFG in AES key expansion modification is increasing the time consumption in generating the key words and thus contributing to the trade-off between security and time consumption.
Table 3 describes the fact that the cost of the attacks for our proposed RK-AES is much higher than the original AES due to the use of randomness with SRFG in several layer.
Moreover, as per our previous work, using SRFG as a cryptographic function in AES has been proved beneficial.