Repeated differential properties of the AES-128 and AES-256 key schedules

Citation data:

Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, Page: 525-532

Publication Year:
2011
Usage 5
Abstract Views 5
Citations 3
Citation Indexes 3
Repository URL:
http://ro.uow.edu.au/infopapers/3830; https://works.bepress.com/wsusilo/257
DOI:
10.1109/trustcom.2011.68
Author(s):
Huang, Jianyong; Susilo, Willy; Seberry, Jennifer
Publisher(s):
Institute of Electrical and Electronics Engineers (IEEE)
Tags:
Computer Science; Physical Sciences and Mathematics
conference paper description
In this paper, we further study the key schedule of the AES algorithm and present some repeated differential properties of the AES-128 and AES-256 key schedules. We define the concept of repeated differential pattern for the AES-128 key schedule, and the notion of double-sized repeated differential pattern for the AES-256 key schedule. We show that if we use the key schedule to expand two 128-bit (or 256-bit) secret keys with the repeated differential pattern (or double-sized repeated differential pattern), the resultant 10-round (or 14-round) sub keys have a large number of bytes in common and the differential pattern has strong repeated features. © 2011 IEEE.