AES Proposal Rijndael Joan Daemen Vincent Rijmen Rijndael
![AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-1.jpg)
![Outline · · · Introduction Applications of Rijndael Design Criteria Rijndael Encryption Resistance Against Outline · · · Introduction Applications of Rijndael Design Criteria Rijndael Encryption Resistance Against](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-2.jpg)
![Introduction AES: Advanced Encryption Standard published by NIST Block Cipher: An encrypting method in Introduction AES: Advanced Encryption Standard published by NIST Block Cipher: An encrypting method in](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-3.jpg)
![Applications of Rijndael cipher is designed to be implemented efficiently on a wide range Applications of Rijndael cipher is designed to be implemented efficiently on a wide range](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-4.jpg)
![Design Criteria • Resistance against all known attacks; • Speed and code compactness on Design Criteria • Resistance against all known attacks; • Speed and code compactness on](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-5.jpg)
![Rijndael Encryption Pseudo code of Rijndael encryption: Rijndael(State, Cipher. Key) { Key. Expansion(Cipher. Key, Rijndael Encryption Pseudo code of Rijndael encryption: Rijndael(State, Cipher. Key) { Key. Expansion(Cipher. Key,](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-6.jpg)
![Resistance Against Known Attacks Attack: If the computational time of a cryptanalysis method(to find Resistance Against Known Attacks Attack: If the computational time of a cryptanalysis method(to find](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-7.jpg)
![List of known cryptanalysis methods: Symmetry properties and weak keys of the DES type List of known cryptanalysis methods: Symmetry properties and weak keys of the DES type](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-8.jpg)
![Security Goal 1. K-security: All possible attack strategies for Rijndael have the same expected Security Goal 1. K-security: All possible attack strategies for Rijndael have the same expected](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-9.jpg)
![Conclusion In security aspect: “Rijndael is expected, for all key and block lengths defined, Conclusion In security aspect: “Rijndael is expected, for all key and block lengths defined,](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-10.jpg)
![Question If a block cipher is k-security, do you think it is secure enough? Question If a block cipher is k-security, do you think it is secure enough?](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-11.jpg)
- Slides: 11
![AES Proposal Rijndael Joan Daemen Vincent Rijmen Rijndael is expected for all key and AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-1.jpg)
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from a block cipher with the given block and key lengths. ” Presented by Jianning TANG
![Outline Introduction Applications of Rijndael Design Criteria Rijndael Encryption Resistance Against Outline · · · Introduction Applications of Rijndael Design Criteria Rijndael Encryption Resistance Against](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-2.jpg)
Outline · · · Introduction Applications of Rijndael Design Criteria Rijndael Encryption Resistance Against Known Attacks Security goal Conclusion Question
![Introduction AES Advanced Encryption Standard published by NIST Block Cipher An encrypting method in Introduction AES: Advanced Encryption Standard published by NIST Block Cipher: An encrypting method in](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-3.jpg)
Introduction AES: Advanced Encryption Standard published by NIST Block Cipher: An encrypting method in which each block of plain text is converted into a block of cipher text of the same length Rijndael: An iterated block cipher with a variable block length and a variable key length. The block length and the key length can be independently specified to 128, 192 or 256 bits.
![Applications of Rijndael cipher is designed to be implemented efficiently on a wide range Applications of Rijndael cipher is designed to be implemented efficiently on a wide range](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-4.jpg)
Applications of Rijndael cipher is designed to be implemented efficiently on a wide range of processors and in dedicated hardware. i. e. Smart Card, ATM, HDTV, B-ISDN, Voice and Satellite (encryption). Rijndael can also be used in MAC algorithm, iterated hash function, synchronous stream cipher, pseudo-random number generator, self-synchronizing stream cipher.
![Design Criteria Resistance against all known attacks Speed and code compactness on Design Criteria • Resistance against all known attacks; • Speed and code compactness on](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-5.jpg)
Design Criteria • Resistance against all known attacks; • Speed and code compactness on a wide range of platforms; • Design simplicity.
![Rijndael Encryption Pseudo code of Rijndael encryption RijndaelState Cipher Key Key ExpansionCipher Key Rijndael Encryption Pseudo code of Rijndael encryption: Rijndael(State, Cipher. Key) { Key. Expansion(Cipher. Key,](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-6.jpg)
Rijndael Encryption Pseudo code of Rijndael encryption: Rijndael(State, Cipher. Key) { Key. Expansion(Cipher. Key, Expanded. Key) ; Add. Round. Key(State, round. Key[0]); For( i=1 ; i<Nr ; i++ ) Round(State, round. Key[i]) ; Final. Round(State, round. Key[Nr]); // return State; } Block Length(bits) Key Length(bits) Nr: number of rounds
![Resistance Against Known Attacks Attack If the computational time of a cryptanalysis methodto find Resistance Against Known Attacks Attack: If the computational time of a cryptanalysis method(to find](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-7.jpg)
Resistance Against Known Attacks Attack: If the computational time of a cryptanalysis method(to find the key) is less than the computational time of an exhausted key search, the method is said to be an effective attack. Plain Text--Cipher Text Pairs: Known to cryptanalyst. Keys: NOT known to cryptanalyst
![List of known cryptanalysis methods Symmetry properties and weak keys of the DES type List of known cryptanalysis methods: Symmetry properties and weak keys of the DES type](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-8.jpg)
List of known cryptanalysis methods: Symmetry properties and weak keys of the DES type Differential cryptanalysis Linear cryptanalysis Truncated differentials The Square attack Interpolation attacks Related-key attacks No attack has yet been found to be effective against Rijndael.
![Security Goal 1 Ksecurity All possible attack strategies for Rijndael have the same expected Security Goal 1. K-security: All possible attack strategies for Rijndael have the same expected](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-9.jpg)
Security Goal 1. K-security: All possible attack strategies for Rijndael have the same expected work factor and storage requirements as for the majority of possible block ciphers with the same dimensions. 2. Hermetic: It does not have weaknesses that are not present for the majority of block ciphers with the same block and key length. Or: its internal structure cannot be exploited in any application. Rijndael is expected to achieve its security goal
![Conclusion In security aspect Rijndael is expected for all key and block lengths defined Conclusion In security aspect: “Rijndael is expected, for all key and block lengths defined,](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-10.jpg)
Conclusion In security aspect: “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from a block cipher with the given block and key lengths. ”
![Question If a block cipher is ksecurity do you think it is secure enough Question If a block cipher is k-security, do you think it is secure enough?](https://slidetodoc.com/presentation_image/0c73bc94656d2d7e0dd81a748afd68f6/image-11.jpg)
Question If a block cipher is k-security, do you think it is secure enough?