New key expansion function of rijndael 128-bit resistance to the related-key attacks

A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key model attacks. Rijndael is the most c...

Full description

Saved in:
Bibliographic Details
Main Authors: Hussien, Hassan Mansur, Muda, Zaiton, Md Yasin, Sharifah
Format: Article
Language:English
Published: Universiti Utara Malaysia Press 2018
Online Access:http://psasir.upm.edu.my/id/eprint/75075/1/New%20key%20expansion%20function%20of%20rijndael%20128-bit%20resistance%20to%20the%20related-key%20attacks.pdf
http://psasir.upm.edu.my/id/eprint/75075/
http://www.jict.uum.edu.my/index.php/previous-issues/156-journal-of-information-and-communication-technology-jict-vol17-no-3-july-2018#b
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Putra Malaysia
Language: English
id my.upm.eprints.75075
record_format eprints
spelling my.upm.eprints.750752019-11-28T05:07:24Z http://psasir.upm.edu.my/id/eprint/75075/ New key expansion function of rijndael 128-bit resistance to the related-key attacks Hussien, Hassan Mansur Muda, Zaiton Md Yasin, Sharifah A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key model attacks. Rijndael is the most common block cipher, and it was adopted by the National Institute of Standards and Technology, USA in 2001 as an Advance Encryption Standard. However, a few studies on cryptanalysis revealed that a security weakness of Rijndael refers to its vulnerability to related-key differential attack as well as the related-key boomerang attack, which is mainly caused by the lack of nonlinearity in the key schedule of Rijndael. In relation to this, constructing a key schedule that is both efficient and provably secure has been an ongoing open problem. Hence, this paper presents a method to improve the key schedule of Rijndael 128-bit for the purpose of making it more resistance to the related-key differential and boomerang attacks. In this study, two statistical tests, namely the Frequency test and the Strict Avalanche Criterion test were employed to respectively evaluate the properties of bit confusion and bit diffusion. The results showed that the proposed key expansion function has excellent statistical properties and agrees with the concept of Shannon’s diffusion and confusion bits. Meanwhile, the Mixed Integer Linear Programmingbased approach was adopted to evaluate the resistance of the proposed approach towards the related-key differential and boomerang attacks. The proposed approach was also found to be resistant against the two attacks discovered in the original Rijndael. Overall, these results proved that the proposed approach is able to perform better compared to the original Rijndael key expansion function and that of the previous research. Universiti Utara Malaysia Press 2018-07 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/75075/1/New%20key%20expansion%20function%20of%20rijndael%20128-bit%20resistance%20to%20the%20related-key%20attacks.pdf Hussien, Hassan Mansur and Muda, Zaiton and Md Yasin, Sharifah (2018) New key expansion function of rijndael 128-bit resistance to the related-key attacks. Journal of Information and Communication Technology, 17 (3). 409 - 434. ISSN 1675-414X; ESSN: 2180-3862 http://www.jict.uum.edu.my/index.php/previous-issues/156-journal-of-information-and-communication-technology-jict-vol17-no-3-july-2018#b
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key model attacks. Rijndael is the most common block cipher, and it was adopted by the National Institute of Standards and Technology, USA in 2001 as an Advance Encryption Standard. However, a few studies on cryptanalysis revealed that a security weakness of Rijndael refers to its vulnerability to related-key differential attack as well as the related-key boomerang attack, which is mainly caused by the lack of nonlinearity in the key schedule of Rijndael. In relation to this, constructing a key schedule that is both efficient and provably secure has been an ongoing open problem. Hence, this paper presents a method to improve the key schedule of Rijndael 128-bit for the purpose of making it more resistance to the related-key differential and boomerang attacks. In this study, two statistical tests, namely the Frequency test and the Strict Avalanche Criterion test were employed to respectively evaluate the properties of bit confusion and bit diffusion. The results showed that the proposed key expansion function has excellent statistical properties and agrees with the concept of Shannon’s diffusion and confusion bits. Meanwhile, the Mixed Integer Linear Programmingbased approach was adopted to evaluate the resistance of the proposed approach towards the related-key differential and boomerang attacks. The proposed approach was also found to be resistant against the two attacks discovered in the original Rijndael. Overall, these results proved that the proposed approach is able to perform better compared to the original Rijndael key expansion function and that of the previous research.
format Article
author Hussien, Hassan Mansur
Muda, Zaiton
Md Yasin, Sharifah
spellingShingle Hussien, Hassan Mansur
Muda, Zaiton
Md Yasin, Sharifah
New key expansion function of rijndael 128-bit resistance to the related-key attacks
author_facet Hussien, Hassan Mansur
Muda, Zaiton
Md Yasin, Sharifah
author_sort Hussien, Hassan Mansur
title New key expansion function of rijndael 128-bit resistance to the related-key attacks
title_short New key expansion function of rijndael 128-bit resistance to the related-key attacks
title_full New key expansion function of rijndael 128-bit resistance to the related-key attacks
title_fullStr New key expansion function of rijndael 128-bit resistance to the related-key attacks
title_full_unstemmed New key expansion function of rijndael 128-bit resistance to the related-key attacks
title_sort new key expansion function of rijndael 128-bit resistance to the related-key attacks
publisher Universiti Utara Malaysia Press
publishDate 2018
url http://psasir.upm.edu.my/id/eprint/75075/1/New%20key%20expansion%20function%20of%20rijndael%20128-bit%20resistance%20to%20the%20related-key%20attacks.pdf
http://psasir.upm.edu.my/id/eprint/75075/
http://www.jict.uum.edu.my/index.php/previous-issues/156-journal-of-information-and-communication-technology-jict-vol17-no-3-july-2018#b
_version_ 1651869171839926272