Improvement of the Round Key Generation of AES ()
Abstract
The key generation algorithm of AES was introduced; the weaknesses of the key generation design of AES were investigated. According to the key demand put forward a kind of new design idea, and this designing strategy was developed, which can be used to improve the key generation algorithm of AES. An analysis shows that such improvement can enhance the safety of the original algorithm without reducing its efficiency.
Share and Cite:
J. Wang, H. Xu and M. Yao, "Improvement of the Round Key Generation of AES,"
International Journal of Communications, Network and System Sciences, Vol. 5 No. 12, 2012, pp. 850-853. doi:
10.4236/ijcns.2012.512090.
Conflicts of Interest
The authors declare no conflicts of interest.
References
[1]
|
N. Ferguson, J. Kelsey, B. Schneier, et al., “Improved Cryptanalysis of Rijndael, Selected Areas in Cryptography 2008,” 2009.
|
[2]
|
E. Tittel, M. Chapple and James, “The Authentication Information System Security Experts Holographic Tutorial CISSP: Certified Informa,” Publishing House of Electronics Industry, Beijing, 2008.
|
[3]
|
Z. H. Yang, “Testing Efficiency of Encryption Network Security: Theory and Practice,” 2008.
|
[4]
|
J. Daemen and V. Rijmen, “AES Proposal: Rijndael (Version 2),” 2005.
|
[5]
|
J. Daemen and V. Rijmen, “The Design of Rijndael: AES—The Advanced Encryption Stand,” Springer-Verlag, Berlin, 2002.
|
[6]
|
J.-S. Cui and H.-G. Zhang, “MARS Algorithm—Candidate of Advanced Encryption Standard,” Communication Security, Vol. 22, No. 2, 2000, pp. 59-66.
|
[7]
|
B. Yang, “Modern Cryptology,” Publishing House of Tsinghua University, Beijing, 2009.
|