Abstract
We explain the theoretical background of the wide trail design strategy, which was used to design Rijndael, the Advanced Encryption Standard (AES). In order to facilitate the discussion, we introduce our own notation to describe differential and linear cryptanalysis. We present a block cipher structure and prove bounds on the resistance against differential and linear cryptanalysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson, E. Biham, and L. R. Knudsen. Serpent. In Proceedings of the first AES candidate conference, Ventura, August 1998.
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3–72, 1991.
J. Daemen, R. Govaerts, and J. Vandewalle. Anew approach to block cipher design. In Vaudenay [10], pages 18–32.
J. Daemen, L. R. Knudsen, and V. Rijmen. Linear frameworks for block ciphers. Designs, Codes and Cryptography, 22(1):65–87, January 2001.
J. Daemen, M. Peeters, G. V. Assche, and V. Rijmen. Noekeon. In First open NESSIE Workshop, Leuven, November2000.
L. R. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption’ 94, volume 1008 of Lecture Notes in Computer Science, pages 196–211. Springer-Verlag, 1995.
M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology, Proceedings of Eurocrypt’ 93, volume 765 of Lecture Notes in Computer Science, pages 386–397. Springer-Verlag, 1994.
K. Nyberg. Linear approximation of block ciphers. In A. D. Santis, editor, Advances in Cryptology, Proceedings of Eurocrypt’ 94, volume 950 of Lecture Notes in Computer Science, pages 439–444. Springer-Verlag, 1995.
C. E. Shannon. Communication theory of secrecy systems. Bell Syst. Tech. Journal, 28:656–715, 1949.
S. Vaudenay, editor. Fast Software Encryption’ 98, volume 1372 of Lecture Notes in Computer Science. Springer-Verlag, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Daemen, J., Rijmen, V. (2001). The Wide Trail Design Strategy. In: Honary, B. (eds) Cryptography and Coding. Cryptography and Coding 2001. Lecture Notes in Computer Science, vol 2260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45325-3_20
Download citation
DOI: https://doi.org/10.1007/3-540-45325-3_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43026-1
Online ISBN: 978-3-540-45325-3
eBook Packages: Springer Book Archive