Key transformation approach for Rijndael security.

The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexi...

Full description

Saved in:
Bibliographic Details
Main Authors: Muda, Zaiton, Mahmod, Ramlan, Sulong, Mek Rahmah
Format: Article
Language:English
English
Published: Asian Network for Scientific Information 2010
Online Access:http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf
http://psasir.upm.edu.my/id/eprint/15386/
http://scialert.net/jindex.php?issn=1812-5638
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.15386
record_format eprints
spelling my.upm.eprints.153862015-10-20T08:55:09Z http://psasir.upm.edu.my/id/eprint/15386/ Key transformation approach for Rijndael security. Muda, Zaiton Mahmod, Ramlan Sulong, Mek Rahmah The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule. Asian Network for Scientific Information 2010-03 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf Muda, Zaiton and Mahmod, Ramlan and Sulong, Mek Rahmah (2010) Key transformation approach for Rijndael security. Information Technology Journal, 9 (2). pp. 290-297. ISSN 1812-5638; ESSN: 1812-5646 http://scialert.net/jindex.php?issn=1812-5638 10.3923/itj.2010.290.297 English
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
English
description The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule.
format Article
author Muda, Zaiton
Mahmod, Ramlan
Sulong, Mek Rahmah
spellingShingle Muda, Zaiton
Mahmod, Ramlan
Sulong, Mek Rahmah
Key transformation approach for Rijndael security.
author_facet Muda, Zaiton
Mahmod, Ramlan
Sulong, Mek Rahmah
author_sort Muda, Zaiton
title Key transformation approach for Rijndael security.
title_short Key transformation approach for Rijndael security.
title_full Key transformation approach for Rijndael security.
title_fullStr Key transformation approach for Rijndael security.
title_full_unstemmed Key transformation approach for Rijndael security.
title_sort key transformation approach for rijndael security.
publisher Asian Network for Scientific Information
publishDate 2010
url http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf
http://psasir.upm.edu.my/id/eprint/15386/
http://scialert.net/jindex.php?issn=1812-5638
_version_ 1643825919180144640
score 13.209306