On Some Cryptographic Properties of Rijndael

  • Selçuk Kavut
  • Melek D. Yücel
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2052)


We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES). Since the s-box of Rijndael applies a nonlinear transformation operating on each byte of the intermediate cipher result independently, its characteristics have significant effects on the strength of the entire system. The characteristics of Rijndael’s s-box are investigated for the criteria of avalanche, strict avalanche, bit independence, nonlinearity and XOR table distribution. We also evaluate the overall performance for different rounds of Rijndael, and compare it to Safer K-64, in terms of Avalanche Weight Distribution (AWD) criterion.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Daemen, J. and Rijmen, V.: AES Proposal: Rijndael. NIST Publication (1999)Google Scholar
  2. 2.
    Massey, J.L.: SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. Fast Software Encryption — Proceedings of Cambridge Security Workshop, Cambridge, U.K., LNCS 809, Springer Verlag (1994) 1–17Google Scholar
  3. 3.
    Aras, E.: Analysis of Security Criteria for Block Ciphers. M.S. Thesis, Middle East Technical University, Ankara, Türkiye (September 1999)Google Scholar
  4. 4.
    Kam, J.B. and Davida, G.I..: Structured design of substution-permutation encryption networks. IEEE Transactions on Computers, Vol. C-28,No.10, (October 1979) 747–753CrossRefMathSciNetGoogle Scholar
  5. 5.
    Feistel, H.: Cryptography and computer privacy. Scientific American. Vol. 228,No.5 (May 1973) 15–23CrossRefGoogle Scholar
  6. 6.
    Webster, A.F. and Tavares, S.E.: On the Design of S-boxes. Advances in Cryptology: Proceedings of CRYPTO’85, Springer Verlag, New York, (1986) 523–534CrossRefGoogle Scholar
  7. 7.
    Adi Shamir and Eli Biham: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4,No. 1 (1991) 3–72zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Meier W. and Staffelbach, O.: Nonlinearity Criteria For Cryptographic Functions. Advances in Cryptology, Proc. EUROCRYPT’89, Springler-Verlag (1989) 549–562Google Scholar
  9. 9.
    Vergili, I.: Statistics on Satisfaction of Security Criteria for Randomly Generated S-boxes. M.S. Thesis, Middle East Technical University, Ankara, Türkiye (June 2000)Google Scholar
  10. 10.
    Vergili, I. and Yücel, M.D.: On Satisfaction of Some Security Criteria for Randomly Chosen S-Boxes. Proc. 20th Biennial Symp. on Communications, Kingston (May 2000) 64–68Google Scholar
  11. 11.
    Aras, E. and Yücel, M.D.: Some Cryptographic Properties of Exponentiation and Logarithm Taking S-Boxes. Proc. 20th Biennial Symp. on Communications, Kingston, Canada (May 2000) 69–73Google Scholar
  12. 12.
    Soto, J. and Basham, L.: Randomnes Testing of the Advanced Encryption Standard Finalist Candidates. NIST Publication (March 2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Selçuk Kavut
    • 1
  • Melek D. Yücel
    • 1
  1. 1.Electrical & Electronics Engineering Dept.Middle East Technical University TüBÍTAK-BILTEN, Information Technologies and Electronics Research InstituteGermany

Personalised recommendations