2005
DOI: 10.1007/11506447_11
|View full text |Cite
|
Sign up to set email alerts
|

Complementation-Like and Cyclic Properties of AES Round Functions

Abstract: Abstract.While it is known previously that the cycle lengths of individual components of the AES round function are very small, we demonstrate here that the cycle length of the S-box combined with the ShiftRow and MixColumn transformation is at least 10205 . This result is obtained by providing new invariances of the complete AES round function without the key addition. Furthermore, we consider self-duality properties of the AES round function and derive a property analogous to the complementation property of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(23 citation statements)
references
References 10 publications
0
23
0
Order By: Relevance
“…For instance, for round 9, the input (resp. output) difference of AES 0 is ΔR 7 . We can recover two more S 7 words (of additional 2 rounds) if we shift the round where we apply the difference Δα and instead to P 0 we introduce Δα at P 2 and Δβ at P 3 .…”
Section: Recovery Of State Wordsmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, for round 9, the input (resp. output) difference of AES 0 is ΔR 7 . We can recover two more S 7 words (of additional 2 rounds) if we shift the round where we apply the difference Δα and instead to P 0 we introduce Δα at P 2 and Δβ at P 3 .…”
Section: Recovery Of State Wordsmentioning
confidence: 99%
“…We first recall the known symmetric property of the AES round function [7]. Namely, if a state is symmetric in the sense that its two halves are equal, then the keyless round function AES 0 of the AES maintains this property.…”
Section: Symmetric Properties Of the Aes Round Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in [19] a subset of invariant values under the encryption process (in weak key classes) in PRINTcipher are identified. Another example is the subset of special states identified in [18] which contains states whose left half is equal to the right half, and is an invariant of the encryption under keyless AES. We also note the close relationship between our approach and many of the self-similarity properties identified over the years.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we only focus on ECHO-256 and refer to the original publication [1] for more details on both ECHO-256 and ECHO-512 versions. Note that the keys used in the two AES rounds are an internal counter and the salt, respectively: they are mainly introduced to break the existing symmetries of the AES unkeyed permutation [7]. Since we are not using any property relying on symmetry and that adding constants does not change differences, we omit these steps.…”
Section: Introductionmentioning
confidence: 99%