• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 9 (2), 2010
  3. 290-297
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2010 | Volume: 9 | Issue: 2 | Page No.: 290-297
DOI: 10.3923/itj.2010.290.297

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 387

Authors


Z. Muda

Country: Malaysia

R. Mahmod

Country: Malaysia

M.R. Sulong

Country: Malaysia

Keywords


  • Cryptography
  • key transformation approach
  • Rijndael algorithm
Research Article

Key Transformation Approach for Rijndael Security

Z. Muda, R. Mahmod and M.R. Sulong
The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit confusion and diffusion of the Rijndael subkey. Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128 bit Rijndael key schedule does not satisfy the frequency (bit confusion) test for majority of subkeys and does not satisfy the avalanche (bit diffusion) test for any subkeys. These contribute to some attacks in the key schedule. Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule.
PDF Fulltext XML References Citation

How to cite this article

Z. Muda, R. Mahmod and M.R. Sulong, 2010. Key Transformation Approach for Rijndael Security. Information Technology Journal, 9: 290-297.

DOI: 10.3923/itj.2010.290.297

URL: https://scialert.net/abstract/?doi=itj.2010.290.297

Related Articles

Light Weight Steganography on RISC Platform-Implementation and Analysis
Compiler Optimization and Plain Text Pre-Processing to Hoist the Height of HIGHT in AVR Platform
Humming Bird with Coloured Wings: A Feedback Security Approach
Humming Bird with Coloured Wings: A Feedback Security Approach
An Improved Rijndael Encryption Algorithm Based on NiosII

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved