Skip to main content

Strengthening the Key Schedule of the AES

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2384))

Included in the following conference series:

Abstract

In this paper we present practical guidelines for designing secure block cipher key schedules. In particular we analyse the AES key schedule and discuss its security properties both from a theoretical viewpoint, and in relation to published attacks exploiting weaknesses in its key schedule. We then propose and analyse an efficient and more secure key schedule.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Daemen, L. Knudsen and V. Rijmen. The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267, Springer-Verlag, 1997, pp 149–165.

    Chapter  Google Scholar 

  2. E. Biham. New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology-EUROCRYPT’93, LNCS 765, Springer-Verlag, 1993, pp 398–409.

    Google Scholar 

  3. J. Daemen, R. Govaerts and J. Vandewalle. Weak Keys for IDEA, Advances in Cryptology-CRYPTO’93, LNCS 773, Springer-Verlag, 1993, pp 224–231.

    Google Scholar 

  4. L. Knudsen. New Potentially Weak Keys for DES and LOKI, Advances in Cryptology-EUROCRYPT’94, LNCS 950, Springer-Verlag, 1994, pp 419–424.

    Chapter  Google Scholar 

  5. L. Knudsen. Cryptanalysis of LOKI91, AUSCRYPT’92, LNCS 718, Springer-Verlag, 1992, pp 196–208.

    Google Scholar 

  6. L. Knudsen. A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology-CRYPTO’95, LNCS 963, Springer-Verlag, 1995, pp 274–286.

    Google Scholar 

  7. J. Daemen and V. Rijmen. Rijndael, First Advanced Encryption Standard Conference, August, 1998. Available at http://csrc.nist.gov/encryption/aes/.

  8. C.E. Shannon. Communication Theory of Secrecy Systems, Bell System Technical Journal, ol. 28, October 1949, pp 656–715.

    Google Scholar 

  9. L. Knudsen. Practically Secure Feistel Ciphers, Fast Software Encryption, First International Workshop Proceedings, LNCS 809, Springer-Verlag, 1993, pp 211–221.

    Google Scholar 

  10. M. Leech. A Feistel Cipher with Hardened Key Scheduling, Workshop on Selected Areas in Cryptography (SAC’96), pp 15–29.

    Google Scholar 

  11. V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. DeWin. The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039, Springer-Verlag, 1996, pp 99–111.

    Google Scholar 

  12. B. Schneier. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809, Springer-Verlag, 1993, pp 191–204.

    Google Scholar 

  13. K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000), LNCS 2012, pp 39–56.

    Chapter  Google Scholar 

  14. N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner and D. Whiting. Improved Cryptanalysis of Rijndael, Fast Software Encryption, Seventh International Workshop, LNCS 1978, Springer-Verlag, 2000, pp 213–230.

    Chapter  Google Scholar 

  15. H. Gustafson, E. Dawson, L. Nielsen and W. Caelli. A Computer Package for Measuring the Strength of Ciphers, Journal of Computers and Security, Vol. 13, No. 8, pp 687–697.

    Google Scholar 

  16. L. Bassham. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference, April 2000. Available at http://csrc.nist.gov/encryption/aes/

  17. B. Gladman. AES Second Round Implementation Experience, Second Advanced Encryption Standard Conference, Available at http://www.nist.gov/aes.

  18. National Institute of Standards and Technology (NIST) (Computer Security Division), Report on the Development of the Advanced Encryption Standard (AES), Available at http://www.nist.gov/aes

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

May, L., Henricksen, M., Millan, W., Carter, G., Dawson, E. (2002). Strengthening the Key Schedule of the AES. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-45450-0_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43861-8

  • Online ISBN: 978-3-540-45450-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics