|
The Advanced Encryption Standard Process |
|
|
1 | (8) |
|
|
1 | (1) |
|
AES: Scope and Significance |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
Algorithm and Implementation Characteristics |
|
|
4 | (1) |
|
Selection of Five Finalists |
|
|
5 | (2) |
|
The Second AES Conference |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (22) |
|
|
10 | (7) |
|
Groups, Rings, and Fields |
|
|
10 | (1) |
|
|
11 | (2) |
|
Fields with a Finite Number of Elements |
|
|
13 | (1) |
|
|
13 | (1) |
|
Operations on Polynomials |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
19 | (4) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
Iterative Boolean Transformations |
|
|
22 | (1) |
|
|
23 | (4) |
|
|
24 | (1) |
|
Key-Alternating Block Ciphers |
|
|
25 | (2) |
|
Block Cipher Modes of Operation |
|
|
27 | (2) |
|
|
27 | (1) |
|
Key-Stream Generation Modes |
|
|
27 | (1) |
|
Message Authentication Modes |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
Specification of Rijndael |
|
|
31 | (22) |
|
Differences between Rijndael and the AES |
|
|
31 | (1) |
|
Input and Output for Encryption and Decryption |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
33 | (8) |
|
|
34 | (3) |
|
|
37 | (1) |
|
|
38 | (2) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (2) |
|
|
43 | (1) |
|
|
43 | (2) |
|
|
45 | (5) |
|
Decryption for a Two-Round Rijndael Variant |
|
|
45 | (1) |
|
|
46 | (2) |
|
The Equivalent Decryption Algorithm |
|
|
48 | (2) |
|
|
50 | (3) |
|
|
53 | (10) |
|
|
53 | (3) |
|
Finite Field Multiplication |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (3) |
|
|
59 | (2) |
|
|
60 | (1) |
|
Efficient Inversion in GF (28) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (18) |
|
Generic Criteria in Cipher Design |
|
|
63 | (2) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (4) |
|
Symmetry Across the Rounds |
|
|
66 | (1) |
|
Symmetry Within the Round Transformation |
|
|
66 | (1) |
|
|
67 | (1) |
|
Symmetry and Simplicity in the S-box |
|
|
68 | (1) |
|
Symmetry between Encryption and Decryption |
|
|
68 | (1) |
|
Additional Benefits of Symmetry |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (2) |
|
|
71 | (1) |
|
Unknown Attacks Versus Known Attacks |
|
|
72 | (1) |
|
Provable Security Versus Provable Bounds |
|
|
73 | (1) |
|
|
73 | (3) |
|
Non-Linearity and Diffusion Criteria |
|
|
73 | (1) |
|
Resistance against Differential and Linear Cryptanalysis |
|
|
73 | (1) |
|
Local Versus Global Optimization |
|
|
74 | (2) |
|
Key-Alternating Cipher Structure |
|
|
76 | (1) |
|
|
76 | (3) |
|
The Function of a Key Schedule |
|
|
76 | (1) |
|
Key Expansion and Key Selection |
|
|
77 | (1) |
|
The Cost of the Key Expansion |
|
|
77 | (1) |
|
A Recursive Key Expansion |
|
|
78 | (1) |
|
|
79 | (2) |
|
The Data Encryption Standard |
|
|
81 | (8) |
|
|
81 | (2) |
|
Differential Cryptanalysis |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
87 | (2) |
|
|
89 | (24) |
|
The Walsh-Hadamard Transform |
|
|
89 | (4) |
|
Parities and Selection Patterns |
|
|
89 | (1) |
|
|
89 | (1) |
|
Real-valued Counterpart of a Binary Boolean Function |
|
|
90 | (1) |
|
Orthogonality and Correlation |
|
|
90 | (1) |
|
Spectrum of a Binary Boolean Function |
|
|
91 | (2) |
|
Composing Binary Boolean Functions |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Disjunct Boolean Functions |
|
|
94 | (1) |
|
|
94 | (4) |
|
Equivalence of a Boolean Function and its Correlation Matrix |
|
|
95 | (1) |
|
Iterative Boolean Functions |
|
|
96 | (1) |
|
|
96 | (2) |
|
Special Boolean Functions |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Cross-correlation and Autocorrelation |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (5) |
|
|
103 | (1) |
|
|
104 | (1) |
|
Averaging over all Round Keys |
|
|
105 | (1) |
|
The Effect of the Key Schedule |
|
|
106 | (2) |
|
Correlation Matrices and Linear Cryptanalysis Literature |
|
|
108 | (3) |
|
Linear Cryptanalysis of the DES |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
111 | (2) |
|
|
113 | (10) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
Difference Propagation Probabilities and Correlation |
|
|
115 | (2) |
|
|
117 | (1) |
|
|
117 | (1) |
|
Independence of Restrictions |
|
|
117 | (1) |
|
|
118 | (1) |
|
The Effect of the Key Schedule |
|
|
119 | (1) |
|
Differential Trails and Differential Cryptanalysis Literature |
|
|
119 | (3) |
|
Differential Cryptanalysis of the DES Revisited |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
123 | (26) |
|
Propagation in Key-alternating Block Ciphers |
|
|
123 | (3) |
|
|
123 | (2) |
|
Differential Cryptanalysis |
|
|
125 | (1) |
|
Differences between Linear Trails and Differential Trails |
|
|
126 | (1) |
|
|
126 | (5) |
|
The γλ Round Structure in Block Ciphers |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
130 | (1) |
|
Branch Numbers and Two-Round Trails |
|
|
131 | (3) |
|
|
133 | (1) |
|
A Two-Round Propagation Theorem |
|
|
133 | (1) |
|
An Efficient Key-Alternating Structure |
|
|
134 | (4) |
|
|
134 | (2) |
|
|
136 | (1) |
|
A Lower Bound on the Bundle Weight of Four-Round Trails |
|
|
136 | (1) |
|
An Efficient Construction for Θ |
|
|
137 | (1) |
|
The Round Structure of Rijndael |
|
|
138 | (5) |
|
|
138 | (4) |
|
Applying the Wide Trail Strategy to Rijndael |
|
|
142 | (1) |
|
|
143 | (2) |
|
Choices for the Structure of I and π |
|
|
145 | (2) |
|
|
145 | (2) |
|
The Rectangular Structure |
|
|
147 | (1) |
|
|
147 | (2) |
|
|
149 | (12) |
|
|
149 | (1) |
|
|
149 | (5) |
|
|
150 | (1) |
|
|
150 | (2) |
|
Influence of the Final Round |
|
|
152 | (1) |
|
|
153 | (1) |
|
Extension at the Beginning |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (2) |
|
The Four-Round Distinguisher |
|
|
154 | (1) |
|
The Attack on Seven Rounds |
|
|
155 | (1) |
|
|
156 | (1) |
|
Symmetry Properties and Weak Keys as in the DES |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (3) |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
161 | (68) |
|
|
161 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (2) |
|
|
165 | (3) |
|
|
168 | (3) |
|
|
171 | (2) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (2) |
Appendices |
|
|
A. Propagation Analysis in Galois Fields |
|
|
175 | (20) |
|
A.1 Functions over GF (2n) |
|
|
176 | (1) |
|
A.1.1 Difference Propagation |
|
|
177 | (1) |
|
|
177 | (2) |
|
A.1.3 Functions that are Linear over GF (2n) |
|
|
179 | (1) |
|
A.1.4 Functions that are Linear over GF (2) |
|
|
180 | (1) |
|
A.2 Functions over (GF(2n))e |
|
|
181 | (1) |
|
A.2.1 Difference Propagation |
|
|
182 | (1) |
|
|
182 | (1) |
|
A.2.3 Functions that are Linear over GF(2'') |
|
|
182 | (1) |
|
A.2.4 Functions that are Linear over GF(2) |
|
|
183 | (1) |
|
A.3 Representations of GF (pn) |
|
|
184 | (1) |
|
A.3.1 Cyclic Representation of GF (pn) |
|
|
184 | (1) |
|
A.3.2 Vector Space Representation of GF(pn) |
|
|
184 | (1) |
|
|
185 | (1) |
|
A.4 Boolean Functions and Functions in GF (2n) |
|
|
186 | (1) |
|
A.4.1 Differences in GF(2)n and GF(2n) |
|
|
186 | (1) |
|
A.4.2 Relationship Between Trace Patterns and Selection Patterns |
|
|
187 | (1) |
|
A.4.3 Relationship Between Linear Functions in GF(p)n and GF(pn) |
|
|
187 | (3) |
|
|
190 | (2) |
|
|
192 | (3) |
|
|
195 | (16) |
|
B.1 Transformations with Maximum Branch Number |
|
|
196 | (3) |
|
B.2 Bounds for Two Rounds |
|
|
199 | (1) |
|
B.2.1 Difference Propagation |
|
|
200 | (2) |
|
|
202 | (2) |
|
B.3 Bounds for Four Rounds |
|
|
204 | (1) |
|
|
205 | (1) |
|
B.4.1 Differential Trails |
|
|
205 | (2) |
|
|
207 | (4) |
|
|
211 | (4) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (3) |
|
|
215 | (6) |
|
|
215 | (1) |
|
|
215 | (2) |
|
D.3 Other Block Lengths and Key Lengths |
|
|
217 | (4) |
|
|
221 | (8) |
Bibliography |
|
229 | (6) |
Index |
|
235 | |