CFP last date
20 May 2024
Reseach Article

Improving the Diffusion power of AES Rijndael with key multiplication

by Mohan H.S., A. Raji Reddy, Manjunath T.N
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 30 - Number 5
Year of Publication: 2011
Authors: Mohan H.S., A. Raji Reddy, Manjunath T.N
10.5120/3635-5076

Mohan H.S., A. Raji Reddy, Manjunath T.N . Improving the Diffusion power of AES Rijndael with key multiplication. International Journal of Computer Applications. 30, 5 ( September 2011), 39-44. DOI=10.5120/3635-5076

@article{ 10.5120/3635-5076,
author = { Mohan H.S., A. Raji Reddy, Manjunath T.N },
title = { Improving the Diffusion power of AES Rijndael with key multiplication },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 30 },
number = { 5 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 39-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume30/number5/3635-5076/ },
doi = { 10.5120/3635-5076 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:16:12.707664+05:30
%A Mohan H.S.
%A A. Raji Reddy
%A Manjunath T.N
%T Improving the Diffusion power of AES Rijndael with key multiplication
%J International Journal of Computer Applications
%@ 0975-8887
%V 30
%N 5
%P 39-44
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Block ciphers are very important in communication systems as they provide confidentiality through encryption. The popular block cipher is an Advanced Encryption Standard (AES). Each cipher uses several rounds of fixed operations to achieve desired security level. The number of rounds in a block cipher is decided based upon the resistivity levels against the known attacks. The very first level of attack on an encryption algorithm is to search for repetitive cipher values and relate them to plaintext. The diffusion enables to spread out the repetitive plain text patterns in the cipher values. The diffusion is achieved using linear operations such as key addition, rotate byte, MDS matrix multiplication, etc. In this paper we propose a method of enhancing the diffusion power by key multiplication rather than conventional key addition used in the Advanced encryption standard algorithm. The paper discusses the problems associated with the key multiplication and provides the possible solutions. The measured results indicate more diffusion when compared with the existing method. Key multiplication, as a diffusion element, is a better solution in the design of encryption algorithms.

References
  1. AES page available via http://www.nist.gov/CryptoToolkit.
  2. Computer Security Objects Register (CSOR): http://csrc.nist.gov/csor/.
  3. J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999, available at
  4. 1.
  5. J. Daemen and V. Rijmen, The block cipher Rijndael, Smart Card research and Applications, LNCS 1820, Springer-Verlag, pp. 288-296.
  6. A. Lee, NIST Special Publication 800-21, Guideline for Implementing Cryptography in the Federal Government, National Institute of Standards and Technology, November 1999.
  7. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997, p. 81-83.
  8. J. Nechvatal, Report on the Development of the Advanced Encryption Standard (AES), National Institute of Standards and Technology, October 2, 2000.
  9. Nicolas Courtois, The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers, in AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, pp. pp. 170-188, Springer.
  10. M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R. Tourki, “Modified AES Based Algorithm for Image Encryption”, World Academy of Science, Engineering and Technology, 2007
  11. Mohan H.S and A. Raji Reddy. "Generating the New S-box and Analyzing the Diffusion Strength to Improve the Security of AES Algorithm”, International Journal of Computer and Network Security, Vol. 2, No. 9, September 2010.
  12. N. Penchalaiah , “Effective Comparison and evaluation of DES and Rijndael Algorithm (AES)”, International Journal on Computer Science and Engineering, Vol. 02, No. 05, 2010, pp.1641-1645.
  13. B.D.C.N.Prasad, P E S N Krishna Prasad, “A Performance Study on AES algorithms”, International Journal of Computer Science and Information Security, Vol. 8, No. 6,September 2010,pp 128-132.
  14. R. Elumalai and A. Raji Reddy. "Improving Diffusion power of AES Rijndael with 8x8 MDS matrix”, International Journal of Scientific and Engineering Research, Vol. 2, Issue-3, March-2011.
Index Terms

Computer Science
Information Sciences

Keywords

Advanced Encryption Standard Diffusion Strict Avalanche Criteria