Transposition of AES Key Schedule | SpringerLink
Skip to main content

Transposition of AES Key Schedule

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10143))

Included in the following conference series:

Abstract

In this paper, we target the poor diffusion pattern in the key schedule of AES. More specifically, the column-by-column word-wise property in the key schedule matches closely with the MixColumns operation in the round diffusion, which leads to several attacks in both single-key and related-key model. Therefore, we propose a new key schedule by switching the interaction from between different columns to between different rows, which offers stronger security than the original AES key schedule and better efficiency than other key schedule proposals. First, our proposal reduces the number of rounds of several single-key attacks, such as popular SQUARE attacks and meet-in-the-middle attacks, e.g. Derbez et al., EUROCYRPT 2013 and Li et al., FSE 2014. Meanwhile, it increases the security margin for AES in the related-key model, namely making the related-key differential attacks with local collisions which broke the full rounds of AES impossible.

Compared with the original key schedule, our modification is slight and just does a transposition on the output matrix of the subkeys. Compared with other AES key schedule variants, no extra non-linear operations, no complicated diffusion method, and no complicated iteration process of generating subkeys exist in our modification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Biryukov, A., Nikolić, I.: Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 322–344. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13190-5_17

    Chapter  Google Scholar 

  2. Biryukov, A., Khovratovich, D., Nikolić, I.: Distinguisher and related-key attack on the full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231–249. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03356-8_14

    Chapter  Google Scholar 

  3. Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1–18. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10366-7_1

    Chapter  Google Scholar 

  4. Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved cryptanalysis of Rijndael. In: Goos, G., Hartmanis, J., Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 213–230. Springer, Heidelberg (2001). doi:10.1007/3-540-44706-7_15

    Chapter  Google Scholar 

  5. May, L., Henricksen, M., Millan, W., Carter, G., Dawson, E.: Strengthening the key schedule of the AES. In: Batten, L., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 226–240. Springer, Heidelberg (2002). doi:10.1007/3-540-45450-0_19

    Chapter  Google Scholar 

  6. Armknecht, F., Lucks, S.: Linearity of the AES key schedule. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2004. LNCS, vol. 3373, pp. 159–169. Springer, Heidelberg (2005). doi:10.1007/11506447_14

    Chapter  Google Scholar 

  7. Daemen, J., Rijmen, V.: AES proposal: Rijndael. In: The First AES Candidate Conference (1998)

    Google Scholar 

  8. Choy, J., Zhang, A., Khoo, K., Henricksen, M., Poschmann, A.: AES variants secure against related-key differential and boomerang attacks. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 191–207. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21040-2_13

    Chapter  Google Scholar 

  9. Nikolić, I.: Tweaking AES. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 198–210. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19574-7_14

    Chapter  Google Scholar 

  10. Huang, J., Lai, X.: Revisiting key schedule’s diffusion in relation with round function’s diffusion. Des. Codes Crypt. 73(1), 85–103 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  11. Lucks, S.: Attacking seven rounds of Rijndael under 192-bit and 256-bit Keys. In: The Third AES Candidate Conference, pp. 215–229 (2000)

    Google Scholar 

  12. Demirci, H., Selçuk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116–126. Springer, Heidelberg (2008). doi:10.1007/978-3-540-71039-4_7

    Chapter  Google Scholar 

  13. Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 158–176. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17373-8_10

    Chapter  Google Scholar 

  14. Wei, Y., Lu, J., Hu, Y.: Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 222–232. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21031-0_17

    Chapter  Google Scholar 

  15. Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237–251. Springer, Heidelberg (1996). doi:10.1007/3-540-68697-5_19

    Google Scholar 

  16. Data Encryption Standard (DES), FIPS PUB 46-2. http://www.itl.nist.gov/fipspubs/fip46-2.htm

  17. Lai, X., Massey, J.L., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 17–38. Springer, Heidelberg (1991). doi:10.1007/3-540-46416-6_2

    Chapter  Google Scholar 

  18. Fleischmann, E., Gorski, M., Lucks, S.: Attacking 9 and 10 rounds of AES-256. In: Boyd, C., González Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 60–72. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02620-1_5

    Chapter  Google Scholar 

  19. Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507–525. Springer, Heidelberg (2005). doi:10.1007/11426639_30

    Chapter  Google Scholar 

  20. Kim, J., Hong, S., Preneel, B.: Related-key rectangle attacks on reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225–241. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74619-5_15

    Chapter  Google Scholar 

  21. Jakimoski, G., Desmedt, Y.: Related-key differential cryptanalysis of 192-bit key AES variants. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 208–221. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24654-1_15

    Chapter  Google Scholar 

  22. Derbez, P., Fouque, P.-A., Jean, J.: Improved key recovery attacks on reduced-round AES in the single-key setting. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 371–387. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38348-9_23

    Chapter  Google Scholar 

  23. Li, L., Jia, K., Wang, X.: Improved single-key attacks on 9-round AES-192/256. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 127–146. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_7

    Google Scholar 

  24. Li, R., Jin, C.: Meet-in-the-middle attacks on 10-round AES-256. Des. Codes Crypt., 1–13 (2015)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61272440, 61472251, U1536101), China Postdoctoral Science Foundation (2013M531174, 2014T70417), and Science and Technology on Communication Security Laboratory.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuejia Lai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Huang, J., Yan, H., Lai, X. (2017). Transposition of AES Key Schedule. In: Chen, K., Lin, D., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2016. Lecture Notes in Computer Science(), vol 10143. Springer, Cham. https://doi.org/10.1007/978-3-319-54705-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54705-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54704-6

  • Online ISBN: 978-3-319-54705-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics