Key transformation approach for Rijndael security.
The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Asian Network for Scientific Information
2010
|
Online Access: | http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf http://psasir.upm.edu.my/id/eprint/15386/ http://scialert.net/jindex.php?issn=1812-5638 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.15386 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.153862015-10-20T08:55:09Z http://psasir.upm.edu.my/id/eprint/15386/ Key transformation approach for Rijndael security. Muda, Zaiton Mahmod, Ramlan Sulong, Mek Rahmah The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule. Asian Network for Scientific Information 2010-03 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf Muda, Zaiton and Mahmod, Ramlan and Sulong, Mek Rahmah (2010) Key transformation approach for Rijndael security. Information Technology Journal, 9 (2). pp. 290-297. ISSN 1812-5638; ESSN: 1812-5646 http://scialert.net/jindex.php?issn=1812-5638 10.3923/itj.2010.290.297 English |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English English |
description |
The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule. |
format |
Article |
author |
Muda, Zaiton Mahmod, Ramlan Sulong, Mek Rahmah |
spellingShingle |
Muda, Zaiton Mahmod, Ramlan Sulong, Mek Rahmah Key transformation approach for Rijndael security. |
author_facet |
Muda, Zaiton Mahmod, Ramlan Sulong, Mek Rahmah |
author_sort |
Muda, Zaiton |
title |
Key transformation approach for Rijndael security. |
title_short |
Key transformation approach for Rijndael security. |
title_full |
Key transformation approach for Rijndael security. |
title_fullStr |
Key transformation approach for Rijndael security. |
title_full_unstemmed |
Key transformation approach for Rijndael security. |
title_sort |
key transformation approach for rijndael security. |
publisher |
Asian Network for Scientific Information |
publishDate |
2010 |
url |
http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf http://psasir.upm.edu.my/id/eprint/15386/ http://scialert.net/jindex.php?issn=1812-5638 |
_version_ |
1643825919180144640 |
score |
13.209306 |