Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Symmetric block ciphers are the most widely utilized cryptographic primitives. Since block ciphers provide privacy; block ciphers are hence used as core components for the construction of hash functions such as one-way compression functions and pseudorandom number generators, all as part of several...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
School of Computing, UUM College of Arts and Sciences
2017
|
Online Access: | http://psasir.upm.edu.my/id/eprint/64457/1/PID169-722-728e.pdf http://psasir.upm.edu.my/id/eprint/64457/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
Language: | English |
id |
my.upm.eprints.64457 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.644572018-07-05T09:35:09Z http://psasir.upm.edu.my/id/eprint/64457/ Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits Hussien, Hassan Mansour Muda, Zaiton Md. Yasin, Sharifah Symmetric block ciphers are the most widely utilized cryptographic primitives. Since block ciphers provide privacy; block ciphers are hence used as core components for the construction of hash functions such as one-way compression functions and pseudorandom number generators, all as part of several cryptographic protocols, etc. These days the most common block cipher is the AES Rijndael, which is used as a standard of symmetric encryption in many countries. Several studies have shown a theoretical attack exploiting the AES key expansion algorithm which allows significant reduction in the complexity time to break the cipher, compared to the brute force attack. The arrack in the related-key model and the long biclique with a meet in the middle attacks in the secret-key model are applied on the AES because of the weak key expansion function. Authors of AES accepted that the key expansion function of Rijndael is comparatively weak. Confusion and diffusion are two properties of the operation a secure cipher. Therefore, although the two properties within the substitution-permutation construct are only applied to state the transformation round function of the Rijndael algorithm, but there is no other strong security for the key expansion function. This article, hence presents a method to improve the Key Schedule of the Rijndael cipher in order to maintain the requirement of bits confusion and diffusion properties besides making the cipher more resistance to differential cryptanalysis. School of Computing, UUM College of Arts and Sciences 2017 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/64457/1/PID169-722-728e.pdf Hussien, Hassan Mansour and Muda, Zaiton and Md. Yasin, Sharifah (2017) Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits. In: 6th International Conference on Computing and Informatics (ICOCI 2017), 25-27 Apr. 2017, Kuala Lumpur, Malaysia. (pp. 722-728). |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
Symmetric block ciphers are the most widely utilized cryptographic primitives. Since block ciphers provide privacy; block ciphers are hence used as core components for the construction of hash functions such as one-way compression functions and pseudorandom number generators, all as part of several cryptographic protocols, etc. These days the most common block cipher is the AES Rijndael, which is used as a standard of symmetric encryption in many countries. Several studies have shown a theoretical attack exploiting the AES key expansion algorithm which allows significant reduction in the complexity time to break the cipher, compared to the brute force attack. The arrack in the related-key model and the long biclique with a meet in the middle attacks in the secret-key model are applied on the AES because of the weak key expansion function. Authors of AES accepted that the key expansion function of Rijndael is comparatively weak. Confusion and diffusion are two properties of the operation a secure cipher. Therefore, although the two properties within the substitution-permutation construct are only applied to state the transformation round function of the Rijndael algorithm, but there is no other strong security for the key expansion function. This article, hence presents a method to improve the Key Schedule of the Rijndael cipher in order to maintain the requirement of bits confusion and diffusion properties besides making the cipher more resistance to differential cryptanalysis. |
format |
Conference or Workshop Item |
author |
Hussien, Hassan Mansour Muda, Zaiton Md. Yasin, Sharifah |
spellingShingle |
Hussien, Hassan Mansour Muda, Zaiton Md. Yasin, Sharifah Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits |
author_facet |
Hussien, Hassan Mansour Muda, Zaiton Md. Yasin, Sharifah |
author_sort |
Hussien, Hassan Mansour |
title |
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits |
title_short |
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits |
title_full |
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits |
title_fullStr |
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits |
title_full_unstemmed |
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits |
title_sort |
enhance the robustness of secure rijndael key expansion function based on increment confusion and diffusion bits |
publisher |
School of Computing, UUM College of Arts and Sciences |
publishDate |
2017 |
url |
http://psasir.upm.edu.my/id/eprint/64457/1/PID169-722-728e.pdf http://psasir.upm.edu.my/id/eprint/64457/ |
_version_ |
1643838028973604864 |