Skip to main content

Consistent Differential Patterns of Rijndael

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2002 (ICISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Included in the following conference series:

  • 6025 Accesses

Abstract

Rijndael is an SPN (Substitution Permutation Network) structure blockcip her, which was recently selected as the AES (Advanced Encryption Standard) algorithm. In this paper, we describe some algebraic properties of the basic functions used in Rijndael, and introduce consistent differential patterns of this cipher. We then describe how these properties can be applied to the cryptanalysis of this cipher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Biham and N. Keller, “Cryptanalysis of Reduced Variants of Rijndael”, http://csrc.nist.gov/encryption/aes/round2/conf3/aes3papers.html, 2000. 149

  2. H. Gilbert and M. Minier, “A Collision Attacko n 7 Rounds of Rijndael”, Proceeding of the Third Advanced Encryption Standard Candidate Conference, NIST, pp.230–241, 2000. 149

    Google Scholar 

  3. J. Daemen and V. Rijmen, “AES Proposal: Rijndae1”, http://csrc.nist.gov/ encryption/aes/rijndael/Rijndael.pdf, 1999. 149, 151, 156

  4. J. Daemen, L. Knudsen, and V. Rijmen, “The BlockC ipher Square”, Proceeding of FSE’97, Lecture Notes In Computer Science Vol.1267, pp.149–165, 1997. 149

    Google Scholar 

  5. J. Cheon, M. Kim, K. Kim, J. Lee, and S. Kang, “Improved Impossible Differential Cryptanalysis of Rijndael and Crypton”, Proceeding of ICISC’2001, Lecture Notes In Computer Science Vol.2288, pp.39–49, 2001.

    Google Scholar 

  6. M. Sugita, K. Kobara, K. Uehara, S. Kubota, and H. Imai, “Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-oriented BlockCip hers like Rijndael, E2”, Proceeding of the Third AES Candidate Conference, 2000. 149

    Google Scholar 

  7. N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and D. Whiting, “Improved Cryptanalysis of Rijndael”, Fast Software Encryption Workshop’ 2000, Preproceeding, 2000. 149, 156

    Google Scholar 

  8. S. Lucks, “Attacking Seven Rounds of Rijndael under 192-Bit and 256-Bit Keys”, Proceeding of the Third Advanced Encryption Standard Candidate Conference, NIST, pp.215–229, 2000. 149

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Song, B., Seberry, J. (2003). Consistent Differential Patterns of Rijndael. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics