Spelling suggestions: "subject:"rijndael"" "subject:"rijidael""
11 |
Algebraická teorie S-boxů / Algebraická teorie S-boxůĎuránová, Elena January 2011 (has links)
The thesis focuses on an algebraic description of S-boxes by the special type of quadratic equations, defined as biaffine equations. Biaffine equations satisfying S-boxes of higher order may not even exist. However, the special type of S-boxes en- ables to find such equations also for S-boxes of higher order. The S-box in the block cipher Rijndael, composed of the inverse function and the affine transformation, is an example of such special type of S-boxes. The thesis proves that a number of biaffine equations satisfying an S-box of this type does not depend on the affine function. The thesis also proves that for every S-box of order n formed by the in- verse function there exist at least 3n − 1 biaffine equations satisfying this S-box. 1
|
12 |
Rijndael Circuit Level CryptanalysisPehlivanoglu, Serdar 05 May 2005 (has links)
The Rijndael cipher was chosen as the Advanced Encryption Standard (AES) in August 1999. Its internal structure exhibits unusual properties such as a clean and simple algebraic description for the S-box. In this research, we construct a scalable family of ciphers which behave very much like the original Rijndael. This approach gives us the opportunity to use computational complexity theory. In the main result, we generate a candidate one-way function family from the scalable Rijndael family. We note that, although reduction to one-way functions is a common theme in the theory of public-key cryptography, it is rare to have such a defense of security in the private-key theatre.
In this thesis a plan of attack is introduced at the circuit level whose aim is not break the cryptosystem in any practical way, but simply to break the very bold Rijndael security claim. To achieve this goal, we are led to a formal understanding of the Rijndael security claim, juxtaposing it with rigorous security treatments. Several of the questions that arise in this regard are as follows: ``Do invertible functions represented by circuits with very small numbers of gates have better than worst case implementations for their inverses?' ``How many plaintext/ciphertext pairs are needed to uniquely determine the Rijndael key?'
|
13 |
Odolnost AES proti časovací analýze / AES Tolerance to Timing AnalysisOndruš, Juraj Unknown Date (has links)
This thesis deals with timing analysis of the AES (Advanced Encryption Standard). The design of {\em Rijndael\/}, which is the AES algorithm, is described here. For the side channel attacks is necessary to know the principles of the cache memory in CPU and its architecture. In this thesis are involved major security problems of AES which can be used for successful attacks. Several different implementations of AES are discussed too. Several types of timing attaks are also described. According to the experimentations these attacks should be efficient to the most presently used AES implementations. Finally, the results of this work are described, possible countermeasures against this attack and motions for the next research.
|
Page generated in 0.034 seconds