Algebraic Aspects of the Advanced Encryption Standard ” by Carlos

نویسندگان

  • Carlos Cid
  • Sean Murphy
  • Matthew Robshaw
  • Stanislav Bulygin
چکیده

In their book the authors give an algebraic perspective of the Advanced Encryption Standard (AES). The cipher Rijndael won the AES competition in 2000 after three years of considerations. Unlike many block ciphers known at that time and proposed nowadays, AES-Rijndael has very explicit algebraic description. The rich algebraic structure of the cipher attracted cryptologists from the moment of appearance of Rijndael. The excellent book of Cid et. al. gives exactly an overview of properties of Rijndael from the algebraic point of view. The book is structured as follows. It contains seven chapters and an appendix, among which the first three are introductory, the next three are the core of the book, and there is also a concluding chapter. After giving a short introduction to the topic and historic remarks in Chapter 1, the authors move to giving the necessary algebraic background in Chapter 2. This chapter contains all the algebraic notions one needs for understanding the follow-up chapters. The chapter covers such fundamental topics as groups, rings, and fields; univariate, including the Lagrange Interpolation Formula, and multivariate, including the notion of the polynomial ordering, polynomial rings. Further, necessary notions from linear and matrix algebra are presented using linear and matrix parts of the AES description as examples. As is usual for cryptology, one is dealing with finite fields as an underlying object. So the topic of the finite fields is considered next: which finite fields exist out there and how one works with them efficiently. A quite significant part of the book is devoted to algebraic attacks on the AES, therefore the notion of a Gröbner basis is a central notion for that. The section “Varieties and Gröbner bases” gives a succinct overview of this important area. After providing the reader with necessary tools, the book continues with the actual description of the AES in Chapter 3. While giving a description of the AES, the authors make sure that the algebraic essence of the cipher is seen and the underlying algebraic features are emphasized. In particular, the reader realizes the fact that the nonlinear S-Box transformation in the AES is essentially an inversion operation over the field GF (28), unlike the usual way of defining an S-Box via a look-up table, so that underlying algebraic structure is usually not apparent. The chapter ends with an introduction to the small scale variants of the AES: a handy tool for algebraic attacks considered later on. The next Chapter 4 is devoted to the algebraic properties of the AES. In particular, linear

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some Algebraic Aspects of the Advanced Encryption Standard

Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously evaluated by the cryptographic

متن کامل

Computational and Algebraic Aspects of the Advanced Encryption Standard

The new Advanced Encryption Standard (AES) has been recently selected by the US government to replace the old Data Encryption Standard (DES) for protecting sensitive official information. Due to its simplicity and elegant algebraic structure, the choice of the AES algorithm has motivated the study of a new approach to the analysis of block ciphers. While conventional methods of cryptanalysis (e...

متن کامل

Algebraic aspects of the advanced encryption standard

Reading is a hobby to open the knowledge windows. Besides, it can provide the inspiration and spirit to face this life. By this way, concomitant with the technology development, many companies serve the e-book or book in soft file. The system of this book of course will be much easier. No worry to forget bringing the algebraic aspects of the advanced encryption standard book. You can open the d...

متن کامل

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009