UPM Institutional Repository

Key transformation approach for Rijndael security.


Muda, Zaiton and Mahmod, Ramlan and Sulong, Mek Rahmah (2010) Key transformation approach for Rijndael security. Information Technology Journal, 9 (2). pp. 290-297. ISSN 1812-5638; ESSN: 1812-5646


The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule.

Download File

PDF (Abstract)
Key transformation approach for Rijndael security.pdf

Download (83kB) | Preview
Official URL or Download Paper: http://scialert.net/jindex.php?issn=1812-5638

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.3923/itj.2010.290.297
Publisher: Asian Network for Scientific Information
Keywords: Cryptography; Rijndael algorithm; Key transformation approach.
Depositing User: Ms. Nida Hidayati Ghazali
Date Deposited: 06 Mar 2014 08:03
Last Modified: 20 Oct 2015 08:55
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.3923/itj.2010.290.297
URI: http://psasir.upm.edu.my/id/eprint/15386
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item