Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Essential Algebraic Structure within the AES
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
In How Many Ways Can You Write Rijndael?
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
An Implementation of DES and AES, Secure against Some Attacks
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Multiplicative Masking and Power Analysis of AES
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
The design of a stream cipher LEX
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
A new MAC construction alred and a specific instance ALPHA-MAC
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Hi-index | 0.00 |
This paper presents a five-round algebraic property of theAdvanced Encryption Standard (AES). In the proposed property, wemodify twenty bytes from five intermediate values at some fixedlocations in five consecutive rounds, and we show that after fiverounds of operations, such modifications do not change theintermediate result and finally still produce the same ciphertext.We introduce an algorithm named Δ, and the algorithmaccepts a plaintext and a key as two inputs and outputs twentybytes, which are used in the five-round property. We demonstratethat the Δalgorithm has 20 variants for AES-128, 28variants for AES-192 and 36 variants for AES-256. By employing theΔalgorithm, we define a modified version of the AESalgorithm, the ΔAES. The ΔAES callsthe Δalgorithm to generate twenty bytes, and usesthese twenty bytes to modify the AES round keys. TheΔAES employs the same key scheduling algorithm,constants and round function as the AES. For a plaintext and a key,the AES and the ΔAES produce the sameciphertext.