This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on cryptanalytic attacks and related topics, algebraic attacks and related results, hardware implementations, and other topics. All in all, the papers constitute a most up-to-date assessment of the state of the art of data encryption using the Advanced Encryption Standard AES, the de facto world standard for data encryption.
Author(s): Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa
Series: Lecture ... Computer Science / Security and Cryptology
Edition: 1
Publisher: Springer
Year: 2005
Language: English
Pages: 179
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;Материалы конференций;
front-matter.pdf......Page 2
Introduction......Page 10
The Components......Page 11
The S-Box......Page 12
Rearranging Components......Page 13
Structural Attacks......Page 14
Algebraic Attacks......Page 15
Conclusions......Page 17
Boomerang Attack on SPNs with Incomplete Diffusion......Page 20
Conclusions......Page 24
Introduction......Page 25
A Brief Outline of the AES......Page 26
The Three-Rounds Property......Page 27
The Four-Rounds Distinguisher......Page 29
The ”New Three-Rounds Property”......Page 30
Extension at the Beginning......Page 32
Outline of the Attack......Page 34
Conclusion......Page 35
Introduction......Page 36
General Description......Page 37
A Round......Page 38
Key Scheduling......Page 39
Bit-Fault Attack......Page 40
A Second Type of DFA Attack on the AES-128......Page 41
DFA Attack on $K^9$......Page 42
Attack on $K^8$......Page 43
DFA Attack on $M^8$......Page 46
In Practice......Page 47
Conclusion......Page 48
The First Attack in More Details......Page 49
Introduction......Page 51
Linear and Differential Cryptanalysis......Page 53
Linear and Differential Probability......Page 54
Linear and Differential Characteristics......Page 55
Linear Hulls and Differentials......Page 56
Active S-Boxes and Branch Numbers......Page 57
General Analysis of 2-Round MELP / MEDP......Page 58
Lower Bounding the AES 2-Round MELP / MEDP......Page 61
Best AES 2-Round Upper Bounds Not Tight......Page 63
Modified Version of KMT2 Algorithm......Page 64
Conclusion......Page 65
Introduction......Page 67
Algebraic Attacks......Page 68
XL Algorithm......Page 69
Variants of XL......Page 70
Computational Algebra Techniques......Page 72
The Polynomial Ideal Generated by the BES System......Page 73
Conclusion......Page 74
Introduction......Page 76
Interesting Special Case: AES S-Box......Page 77
From Multivariate Public Key Schemes to General Algebraic Attacks......Page 78
Algebraic Attacks on Stream Ciphers......Page 81
Block Ciphers and Algebraic Relations......Page 83
Global Algebraic Attacks on Block Ciphers......Page 84
Who Invented Algebraic Attacks on Block Ciphers ?......Page 85
The Structure of Algebraic Attacks......Page 86
Applicability of Algebraic Attacks......Page 87
How to Avoid Algebraic Attacks on Block Ciphers......Page 88
Conclusion......Page 89
Introduction......Page 93
An Overview on AES-128......Page 94
The Key Schedule......Page 95
An Overview on the Big Encryption System (BES)......Page 96
BES Key Schedule Translation......Page 99
Encryption......Page 100
Key Generation......Page 101
Encryption......Page 102
Key Generation......Page 104
Conclusions......Page 105
References......Page 106
Introduction......Page 107
ASIC Implementation of AES......Page 108
The Data Unit......Page 109
Performance of the Presented ASIC Design......Page 112
FPGA Implementation of AES......Page 114
Related Work......Page 115
Architecture of the AES FPGA Implementation......Page 116
Performance of the FPGA AES Implementation......Page 118
Conclusions......Page 120
Introduction......Page 122
AES Reminder......Page 123
S-Box Architecture......Page 124
Power Analysis Basics......Page 126
Data Masking and Inversion in $GF(2^4)$......Page 128
Masked $GF(2^n)$ Multiplier......Page 129
Secure AES Coprocessor......Page 131
Conclusion......Page 133
References......Page 134
Introduction......Page 137
Description of the AES Round Function......Page 138
Cyclic Order of Components of $\;I\circ A\circ S\circ M$......Page 139
Invariances of $\;I\circ A\circ S\circ M$......Page 140
On the Cyclic Order of $\;I\circ A\circ S\circ M$......Page 141
Self-duality of the AES Round Function......Page 143
Conclusions......Page 144
Cycles of $\;I\circ A\circ S\circ M$ for ${\rm Inv}_3 etminus {\rm Inv}_2$......Page 146
Cycles of $\;I\circ A\circ S\circ M$ for ${\rm Inv}_4 etminus {\rm Inv}_2$......Page 147
Cycles of $\;I\circ A\circ S\circ M$ for ${\rm Inv}_5 etminus {\rm Inv}_2$......Page 149
Description of Rijndael......Page 151
Dual Ciphers......Page 152
Other Representations of $GF(2^8)$......Page 153
All Possible Representations of $GF(2^8)$......Page 154
Matrix in S-Box $GF(2^2)$-Linear?......Page 155
Conclusions......Page 156
Change of Representation: An Old Mathematical Technique......Page 157
Boolean Transformations and Algebras......Page 158
Finding Descriptions......Page 159
Number of Equivalent Descriptions......Page 160
Hardware Efficient Descriptions......Page 161
Additive Split......Page 162
Additive Split in Tower Fields......Page 163
BES......Page 164
Conclusions and Perspective on the Future......Page 165
Introduction......Page 168
Definitions and Motivation......Page 169
AES with 128 Bit Key Length......Page 170
AES with 192 Bit Key Length......Page 172
AES with 256 Bit Key Length......Page 174
Exact Descriptions......Page 176
Conclusion......Page 177
back-matter.pdf......Page 179