Advertisement

Strengthening the Key Schedule of the AES

  • Lauren May
  • Matt Henricksen
  • William Millan
  • Gary Carter
  • Ed Dawson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Abstract

In this paper we present practical guidelines for designing secure block cipher key schedules. In particular we analyse the AES key schedule and discuss its security properties both from a theoretical viewpoint, and in relation to published attacks exploiting weaknesses in its key schedule. We then propose and analyse an efficient and more secure key schedule.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J. Daemen, L. Knudsen and V. Rijmen. The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267, Springer-Verlag, 1997, pp 149–165.CrossRefGoogle Scholar
  2. 2.
    E. Biham. New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology-EUROCRYPT’93, LNCS 765, Springer-Verlag, 1993, pp 398–409.Google Scholar
  3. 3.
    J. Daemen, R. Govaerts and J. Vandewalle. Weak Keys for IDEA, Advances in Cryptology-CRYPTO’93, LNCS 773, Springer-Verlag, 1993, pp 224–231.Google Scholar
  4. 4.
    L. Knudsen. New Potentially Weak Keys for DES and LOKI, Advances in Cryptology-EUROCRYPT’94, LNCS 950, Springer-Verlag, 1994, pp 419–424.CrossRefGoogle Scholar
  5. 5.
    L. Knudsen. Cryptanalysis of LOKI91, AUSCRYPT’92, LNCS 718, Springer-Verlag, 1992, pp 196–208.Google Scholar
  6. 6.
    L. Knudsen. A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology-CRYPTO’95, LNCS 963, Springer-Verlag, 1995, pp 274–286.Google Scholar
  7. 7.
    J. Daemen and V. Rijmen. Rijndael, First Advanced Encryption Standard Conference, August, 1998. Available at http://csrc.nist.gov/encryption/aes/.
  8. 8.
    C.E. Shannon. Communication Theory of Secrecy Systems, Bell System Technical Journal, ol. 28, October 1949, pp 656–715.Google Scholar
  9. 9.
    L. Knudsen. Practically Secure Feistel Ciphers, Fast Software Encryption, First International Workshop Proceedings, LNCS 809, Springer-Verlag, 1993, pp 211–221.Google Scholar
  10. 10.
    M. Leech. A Feistel Cipher with Hardened Key Scheduling, Workshop on Selected Areas in Cryptography (SAC’96), pp 15–29.Google Scholar
  11. 11.
    V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. DeWin. The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039, Springer-Verlag, 1996, pp 99–111.Google Scholar
  12. 12.
    B. Schneier. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809, Springer-Verlag, 1993, pp 191–204.Google Scholar
  13. 13.
    K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000), LNCS 2012, pp 39–56.CrossRefGoogle Scholar
  14. 14.
    N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner and D. Whiting. Improved Cryptanalysis of Rijndael, Fast Software Encryption, Seventh International Workshop, LNCS 1978, Springer-Verlag, 2000, pp 213–230.CrossRefGoogle Scholar
  15. 15.
    H. Gustafson, E. Dawson, L. Nielsen and W. Caelli. A Computer Package for Measuring the Strength of Ciphers, Journal of Computers and Security, Vol. 13, No. 8, pp 687–697.Google Scholar
  16. 16.
    L. Bassham. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference, April 2000. Available at http://csrc.nist.gov/encryption/aes/
  17. 17.
    B. Gladman. AES Second Round Implementation Experience, Second Advanced Encryption Standard Conference, Available at http://www.nist.gov/aes.
  18. 18.
    National Institute of Standards and Technology (NIST) (Computer Security Division), Report on the Development of the Advanced Encryption Standard (AES), Available at http://www.nist.gov/aes

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Lauren May
    • 1
  • Matt Henricksen
    • 1
  • William Millan
    • 1
  • Gary Carter
    • 2
  • Ed Dawson
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia
  2. 2.School of MathematicsQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations