Repeated Differential Properties of the AES-128 and AES-256 Key Schedules

Citation data:

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Page: 525-532

Publication Year:
Usage 4
Abstract Views 4
Captures 25
Readers 25
Citations 3
Citation Indexes 3
Repository URL:;
Huang, Jianyong; Susilo, Willy; Seberry, Jennifer
Institute of Electrical and Electronics Engineers (IEEE)
Computer Science; Physical Sciences and Mathematics
conference paper description
In this paper, we further study the key schedule of the AES algorithm and present some repeated differential properties of the AES-128 and AES-256 key schedules. We define the concept of repeated differential pattern for the AES-128 key schedule, and the notion of double-sized repeated differential pattern for the AES-256 key schedule. We show that if we use the key schedule to expand two 128-bit (or 256-bit) secret keys with the repeated differential pattern (or double-sized repeated differential pattern), the resultant 10-round (or 14-round) sub keys have a large number of bytes in common and the differential pattern has strong repeated features. © 2011 IEEE.