Article

Article title A NEW APPROACH OF KEY SCHEDULE CONSTRUCTION FOR SYMMETRIC BLOCK CIPHERS
Authors R.V. Oliynykov, V.I. Ruzhentsev
Section SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
Month, Year 11, 2010 @en
Index UDC 681.3.06:519.248.681
DOI
Abstract A new method of non-bijective key schedule construction for symmetric block ciphers which protects cipher from known key attacks and gives additional strength to implementation attacks is proposed. Although non-bijective key schedule potentially allows existence of equivalent encryption keys, it is proved that probability of such event is negligible small. An example of new type of key schedule for Rijndael-like cipher and its analysis are given.

Download PDF

Keywords Key schedule; symmetric block cipher; related key attack; slide attack.
References 1. Shannon C.E. Communication Theory of Secrecy Systems // Bell Syst. Tech. Journal. – 1949. – Vol. 28.
2. FIPS 46-3. Data Encryption Standard (DES).
3. Biryukov D.Wagner. Slide Attacks. Proceedings of FSE'99, LNCS 1636. Springer Verlag. 1999. – P. 245-259.
4. Biham E. New Types of Cryptanalytic Attacks Using Related Keys // Journal of Cryptology. – 1994. – Vol. 7. – P. 229-246.
5. Announcing development of a federal information processing standard for Advanced Encryption Standard. Department of Commerce. National Institute of Standards and Technology, USA. 1997. Available at http://csrc.nist.gov/archive/aes/pre-round1/aes_9701.txt.
6. New European Schemes for Signature, Integrity, and Encryption. Call for Cryptographic Primitives. Information Societies Technology (IST) Program of the European Commission, 2000. Available at https://www.cosic.esat.kuleuven.be/nessie/call.
7. Daemen J., Rijmen V. The design of Rijndael. AES –The Advanced Encryption Standard. Springer-Verlag, Berlin. 2002.
8. Courtois N.T., Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations. Proceedings of Asiacrypt’02, LNCS. Springer-Verlag, 2002.

Comments are closed.