Repeated differential properties of the AES-128 and AES-256 key schedules

3Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we further study the key schedule of the AES algorithm and present some repeated differential properties of the AES-128 and AES-256 key schedules. We define the concept of repeated differential pattern for the AES-128 key schedule, and the notion of double-sized repeated differential pattern for the AES-256 key schedule. We show that if we use the key schedule to expand two 128-bit (or 256-bit) secret keys with the repeated differential pattern (or double-sized repeated differential pattern), the resultant 10-round (or 14-round) sub keys have a large number of bytes in common and the differential pattern has strong repeated features. © 2011 IEEE.

Cite

CITATION STYLE

APA

Huang, J., Susilo, W., & Seberry, J. (2011). Repeated differential properties of the AES-128 and AES-256 key schedules. In Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011 (pp. 525–532). https://doi.org/10.1109/TrustCom.2011.68

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free