Skip to main content

On Some Cryptographic Properties of Rijndael

  • Conference paper
  • First Online:
Information Assurance in Computer Networks (MMM-ACNS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2052))

Abstract

We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES). Since the s-box of Rijndael applies a nonlinear transformation operating on each byte of the intermediate cipher result independently, its characteristics have significant effects on the strength of the entire system. The characteristics of Rijndael’s s-box are investigated for the criteria of avalanche, strict avalanche, bit independence, nonlinearity and XOR table distribution. We also evaluate the overall performance for different rounds of Rijndael, and compare it to Safer K-64, in terms of Avalanche Weight Distribution (AWD) criterion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Daemen, J. and Rijmen, V.: AES Proposal: Rijndael. NIST Publication (1999)

    Google Scholar 

  2. Massey, J.L.: SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. Fast Software Encryption — Proceedings of Cambridge Security Workshop, Cambridge, U.K., LNCS 809, Springer Verlag (1994) 1–17

    Google Scholar 

  3. Aras, E.: Analysis of Security Criteria for Block Ciphers. M.S. Thesis, Middle East Technical University, Ankara, Türkiye (September 1999)

    Google Scholar 

  4. Kam, J.B. and Davida, G.I..: Structured design of substution-permutation encryption networks. IEEE Transactions on Computers, Vol. C-28,No.10, (October 1979) 747–753

    Article  MathSciNet  Google Scholar 

  5. Feistel, H.: Cryptography and computer privacy. Scientific American. Vol. 228,No.5 (May 1973) 15–23

    Article  Google Scholar 

  6. Webster, A.F. and Tavares, S.E.: On the Design of S-boxes. Advances in Cryptology: Proceedings of CRYPTO’85, Springer Verlag, New York, (1986) 523–534

    Chapter  Google Scholar 

  7. Adi Shamir and Eli Biham: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4,No. 1 (1991) 3–72

    Article  MATH  MathSciNet  Google Scholar 

  8. Meier W. and Staffelbach, O.: Nonlinearity Criteria For Cryptographic Functions. Advances in Cryptology, Proc. EUROCRYPT’89, Springler-Verlag (1989) 549–562

    Google Scholar 

  9. Vergili, I.: Statistics on Satisfaction of Security Criteria for Randomly Generated S-boxes. M.S. Thesis, Middle East Technical University, Ankara, Türkiye (June 2000)

    Google Scholar 

  10. Vergili, I. and Yücel, M.D.: On Satisfaction of Some Security Criteria for Randomly Chosen S-Boxes. Proc. 20th Biennial Symp. on Communications, Kingston (May 2000) 64–68

    Google Scholar 

  11. Aras, E. and Yücel, M.D.: Some Cryptographic Properties of Exponentiation and Logarithm Taking S-Boxes. Proc. 20th Biennial Symp. on Communications, Kingston, Canada (May 2000) 69–73

    Google Scholar 

  12. Soto, J. and Basham, L.: Randomnes Testing of the Advanced Encryption Standard Finalist Candidates. NIST Publication (March 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kavut, S., Yücel, M.D. (2001). On Some Cryptographic Properties of Rijndael. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-45116-1_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42103-0

  • Online ISBN: 978-3-540-45116-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics