Repeated Differential Properties of the AES-128 and AES-256 Key Schedules

Citation data:

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Page: 525-532

Publication Year:
2011
Usage 4
Abstract Views 4
Captures 25
Readers 25
Citations 3
Citation Indexes 3
Repository URL:
https://works.bepress.com/wsusilo/257; http://ro.uow.edu.au/infopapers/3830
DOI:
10.1109/trustcom.2011.68
Author(s):
Huang, Jianyong; Susilo, Willy; Seberry, Jennifer
Publisher(s):
Institute of Electrical and Electronics Engineers (IEEE)
Tags:
Computer Science; Physical Sciences and Mathematics
conference paper description
In this paper, we further study the key schedule of the AES algorithm and present some repeated differential properties of the AES-128 and AES-256 key schedules. We define the concept of repeated differential pattern for the AES-128 key schedule, and the notion of double-sized repeated differential pattern for the AES-256 key schedule. We show that if we use the key schedule to expand two 128-bit (or 256-bit) secret keys with the repeated differential pattern (or double-sized repeated differential pattern), the resultant 10-round (or 14-round) sub keys have a large number of bytes in common and the differential pattern has strong repeated features. © 2011 IEEE.