On Some Algebraic Structures in the AES Round Function

نویسندگان

  • Amr M. Youssef
  • Stafford E. Tavares
چکیده

In this paper, we show that all the coordinate functions of the Advanced Encryption Standard (AES) round function are equivalent under an aane transformation of the input to the round function. In other words, let fi and fj be any two distinct output coordinates of the AES round function, then there exists a nonsingular matrix Aji over GF(2) such that fj(Ajix) + bji = fi(x); bji 2 GF(2). We also show that such linear relations will always exist if the Rijndael s-box is replaced by any bijective monomial over GF(2 8).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Five-Round Algebraic Property of the Advanced Encryption Standard

Abstract. This paper presents a five-round algebraic property of the Advanced Encryption Standard (AES). In the proposed property, we modify twenty bytes from five intermediate values at some fixed locations in five consecutive rounds, and we show that after five rounds of operations, such modifications do not change the intermediate result and finally still produce the same ciphertext. We intr...

متن کامل

A five-round algebraic property of AES and its application to the ALPHA-MAC

We present a five-round algebraic property of the advanced encryption standard (AES), and we show that this algebraic property can be used to analyse the internal structure of ALPHA-MAC whose underlying block cipher is AES. In the proposed property, we modify 20 bytes from 5 intermediate values at some fixed locations in 5 consecutive rounds, and we show that after 5 rounds of operations, such ...

متن کامل

Novel Impossible Differential Cryptanalysis of Zorro Block Cipher

Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...

متن کامل

MAGMA-JOINED-MAGMAS: A CLASS OF NEW ALGEBRAIC STRUCTURES

By left magma-$e$-magma, I mean a set containingthe fixed element $e$, and equipped by two binary operations "$cdot$", $odot$ with the property $eodot (xcdot y)=eodot(xodot y)$, namelyleft $e$-join law. So, $(X,cdot,e,odot)$ is a left magma-$e$-magmaif and only if $(X,cdot)$, $(X,odot)$ are magmas (groupoids), $ein X$ and the left $e$-join law holds.Right (and two-sided) magma-$e$-magmas are de...

متن کامل

On Partial Linearization of Byte Substitution Transformation of Rijndael-The AES

Abstract: Rijndael-The AES is 128-bit block cipher based on an elegant algebraic structure over F2. This cipher employs a simple approach to its substitution, permutation (SP) operations. We take a close look at its internals; the byte substitution transformation function is the only non-linear function in Rijndael The AES. This transformation comprises of two steps operating on each byte. Here...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2002  شماره 

صفحات  -

تاریخ انتشار 2002