Abstract
In this paper we present practical guidelines for designing secure block cipher key schedules. In particular we analyse the AES key schedule and discuss its security properties both from a theoretical viewpoint, and in relation to published attacks exploiting weaknesses in its key schedule. We then propose and analyse an efficient and more secure key schedule.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Daemen, L. Knudsen and V. Rijmen. The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267, Springer-Verlag, 1997, pp 149–165.
E. Biham. New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology-EUROCRYPT’93, LNCS 765, Springer-Verlag, 1993, pp 398–409.
J. Daemen, R. Govaerts and J. Vandewalle. Weak Keys for IDEA, Advances in Cryptology-CRYPTO’93, LNCS 773, Springer-Verlag, 1993, pp 224–231.
L. Knudsen. New Potentially Weak Keys for DES and LOKI, Advances in Cryptology-EUROCRYPT’94, LNCS 950, Springer-Verlag, 1994, pp 419–424.
L. Knudsen. Cryptanalysis of LOKI91, AUSCRYPT’92, LNCS 718, Springer-Verlag, 1992, pp 196–208.
L. Knudsen. A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology-CRYPTO’95, LNCS 963, Springer-Verlag, 1995, pp 274–286.
J. Daemen and V. Rijmen. Rijndael, First Advanced Encryption Standard Conference, August, 1998. Available at http://csrc.nist.gov/encryption/aes/.
C.E. Shannon. Communication Theory of Secrecy Systems, Bell System Technical Journal, ol. 28, October 1949, pp 656–715.
L. Knudsen. Practically Secure Feistel Ciphers, Fast Software Encryption, First International Workshop Proceedings, LNCS 809, Springer-Verlag, 1993, pp 211–221.
M. Leech. A Feistel Cipher with Hardened Key Scheduling, Workshop on Selected Areas in Cryptography (SAC’96), pp 15–29.
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. DeWin. The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039, Springer-Verlag, 1996, pp 99–111.
B. Schneier. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809, Springer-Verlag, 1993, pp 191–204.
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000), LNCS 2012, pp 39–56.
N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner and D. Whiting. Improved Cryptanalysis of Rijndael, Fast Software Encryption, Seventh International Workshop, LNCS 1978, Springer-Verlag, 2000, pp 213–230.
H. Gustafson, E. Dawson, L. Nielsen and W. Caelli. A Computer Package for Measuring the Strength of Ciphers, Journal of Computers and Security, Vol. 13, No. 8, pp 687–697.
L. Bassham. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference, April 2000. Available at http://csrc.nist.gov/encryption/aes/
B. Gladman. AES Second Round Implementation Experience, Second Advanced Encryption Standard Conference, Available at http://www.nist.gov/aes.
National Institute of Standards and Technology (NIST) (Computer Security Division), Report on the Development of the Advanced Encryption Standard (AES), Available at http://www.nist.gov/aes
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
May, L., Henricksen, M., Millan, W., Carter, G., Dawson, E. (2002). Strengthening the Key Schedule of the AES. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_19
Download citation
DOI: https://doi.org/10.1007/3-540-45450-0_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43861-8
Online ISBN: 978-3-540-45450-2
eBook Packages: Springer Book Archive