Key transformation approach for Rijndael security.

The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexi...

Full description

Bibliographic Details
Main Authors: Muda, Zaiton, Mahmod, Ramlan, Sulong, Mek Rahmah
Format: Article
Language:English
English
Published: Asian Network for Scientific Information 2010
Online Access:http://psasir.upm.edu.my/id/eprint/15386/
http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf
_version_ 1848842663147601920
author Muda, Zaiton
Mahmod, Ramlan
Sulong, Mek Rahmah
author_facet Muda, Zaiton
Mahmod, Ramlan
Sulong, Mek Rahmah
author_sort Muda, Zaiton
building UPM Institutional Repository
collection Online Access
description The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule.
first_indexed 2025-11-15T08:02:42Z
format Article
id upm-15386
institution Universiti Putra Malaysia
institution_category Local University
language English
English
last_indexed 2025-11-15T08:02:42Z
publishDate 2010
publisher Asian Network for Scientific Information
recordtype eprints
repository_type Digital Repository
spelling upm-153862015-10-20T08:55:09Z http://psasir.upm.edu.my/id/eprint/15386/ Key transformation approach for Rijndael security. Muda, Zaiton Mahmod, Ramlan Sulong, Mek Rahmah The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule. Asian Network for Scientific Information 2010-03 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf Muda, Zaiton and Mahmod, Ramlan and Sulong, Mek Rahmah (2010) Key transformation approach for Rijndael security. Information Technology Journal, 9 (2). pp. 290-297. ISSN 1812-5638; ESSN: 1812-5646 http://scialert.net/jindex.php?issn=1812-5638 10.3923/itj.2010.290.297 English
spellingShingle Muda, Zaiton
Mahmod, Ramlan
Sulong, Mek Rahmah
Key transformation approach for Rijndael security.
title Key transformation approach for Rijndael security.
title_full Key transformation approach for Rijndael security.
title_fullStr Key transformation approach for Rijndael security.
title_full_unstemmed Key transformation approach for Rijndael security.
title_short Key transformation approach for Rijndael security.
title_sort key transformation approach for rijndael security.
url http://psasir.upm.edu.my/id/eprint/15386/
http://psasir.upm.edu.my/id/eprint/15386/
http://psasir.upm.edu.my/id/eprint/15386/
http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf