Key Transformation Approach for Rijndael Security
Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen in 1999. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128- bit Rijndael Key Schedule does not s...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2008
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/5895/1/FSKTM_2008_3%20IR.pdf http://psasir.upm.edu.my/id/eprint/5895/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.5895 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.58952022-01-25T04:31:55Z http://psasir.upm.edu.my/id/eprint/5895/ Key Transformation Approach for Rijndael Security Sulong, Mek Rahmah Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen in 1999. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128- bit Rijndael Key Schedule does not satisfy the frequency (bit confusion) test for majority of Subkeys and does not satisfy the avalanche (bit diffusion) test for any Subkeys. These contribute to some attacks in the Key Schedule. Thus, a new transformation method which is called "ShiftRow" is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method shifts the rows of the Rijndael Subkey after the RCon function is being applied to the Subkey. This method improves the security of Rijndael Key Scheduling by increasing the bit confusion and diffusion of the Rijndael Subkey. The new method has shown positive results in terms of the bit confusion and diffusion of Subkey and it has increased bit confusion and diffusion compared to the Subkey of the original Rijndael Key Schedule. 2008-02 Thesis NonPeerReviewed text en http://psasir.upm.edu.my/id/eprint/5895/1/FSKTM_2008_3%20IR.pdf Sulong, Mek Rahmah (2008) Key Transformation Approach for Rijndael Security. Masters thesis, Universiti Putra Malaysia. Data encryption (Computer science). |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
topic |
Data encryption (Computer science). |
spellingShingle |
Data encryption (Computer science). Sulong, Mek Rahmah Key Transformation Approach for Rijndael Security |
description |
Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen in 1999. It is a
combination of security, performance, efficiency, implementability and flexibility that
makes it the best selection for Advanced Encryption Standard (AES). However, the 128-
bit Rijndael Key Schedule does not satisfy the frequency (bit confusion) test for majority
of Subkeys and does not satisfy the avalanche (bit diffusion) test for any Subkeys. These
contribute to some attacks in the Key Schedule. Thus, a new transformation method
which is called "ShiftRow" is proposed into the 128-bit Rijndael Key Schedule based
upon information principles (bit confusion and diffusion properties). The new method
shifts the rows of the Rijndael Subkey after the RCon function is being applied to the
Subkey. This method improves the security of Rijndael Key Scheduling by increasing the bit confusion and diffusion of the Rijndael Subkey. The new method has shown
positive results in terms of the bit confusion and diffusion of Subkey and it has increased
bit confusion and diffusion compared to the Subkey of the original Rijndael Key Schedule. |
format |
Thesis |
author |
Sulong, Mek Rahmah |
author_facet |
Sulong, Mek Rahmah |
author_sort |
Sulong, Mek Rahmah |
title |
Key Transformation Approach for Rijndael Security |
title_short |
Key Transformation Approach for Rijndael Security |
title_full |
Key Transformation Approach for Rijndael Security |
title_fullStr |
Key Transformation Approach for Rijndael Security |
title_full_unstemmed |
Key Transformation Approach for Rijndael Security |
title_sort |
key transformation approach for rijndael security |
publishDate |
2008 |
url |
http://psasir.upm.edu.my/id/eprint/5895/1/FSKTM_2008_3%20IR.pdf http://psasir.upm.edu.my/id/eprint/5895/ |
_version_ |
1724075528248360960 |
score |
13.209306 |