Browse > Article
http://dx.doi.org/10.9723/jksiis.2010.15.2.001

Modified AES having same structure in encryption and decryption  

Cho, Gyeong-Yeon (부경대학교 공과대학 IT융합응용공학과)
Song, Hong-Bok (동의대학교 공과대학 전자공학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.15, no.2, 2010 , pp. 1-9 More about this Journal
Abstract
Feistel and SPN are the two main structures in a block cipher. Feistel is a symmetric structure which has the same structure in encryption and decryption, but SPN is not a symmetric structure. In this paper, we propose a SPN which has a symmetric structure in encryption and decryption. The whole operations of proposed algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2 round, applies a right function and the last half of them, (N+1)/2 to N round, employs an inverse function. And a symmetry layer is located in between the right function layer and the inverse function layer. In this paper, AES encryption and decryption function are selected for the right function and the inverse function, respectively. The symmetric layer is composed with simple matrix and round key addition. Due to the simplicity of the symmetric SPN structure in hardware implementation, the proposed modified AES is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.
Keywords
AES; SPN(Substitution Permutation Network); encryption; decryption; symmetric layer;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. M. Youssef, S. Mister, and S. E. Tavares, "On the Design of linear Transformation for Substitution and Permutation Encryption Networks," in the Workshop Record of the Workshop on Selected Areas in Cryptography (SAC `97), pp. 40-48, Aug. 1997.
2 S. Hong, S. Lee, J. Lim, J. Sung, and D. Cheon, "Provable security against differential and linear cryptanalysis for the SPN structure," In Fast Software Encryption 2000, LNCS Vol.1978, pp. 273-283, 2001.
3 H. Feistel, "Cryptography and Computer Privacy", Scientific American, Vol. 228, No. 5, page 15-23, 1973.   DOI   ScienceOn
4 C.E. Shannon, "Communication Theory of Secrecy System" Bell System Technical Journal, Vol. 28, No. 4, page 656-715, 1949.   DOI
5 National Bureau of Standards, Data Encryption Standard, FIPS-Pub. 46. National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977
6 "Report on the Development of the Advanced Encryption Standard(AES)", http://www.csrc.nist.gov/encryption/aes/.
7 J. Daemen, and V. Rijmen, "AES Proposal: Rijndael," http://www.csrc.nist.gov/encryption/ aes/rijndael/Rijndael.pdf, 1999.
8 SEED, http://www.kisa.or.kr/seed/.
9 ARIA, http://www.nsri.re.kr/ARIA/.
10 Federal Information Processing Standards Publication 197, "Announcing the ADVANCED ENCRYPTION STANDARD(AES)," Nov. 2001,csrc.nist.gov/publications/fips/fips197/fips-197.pdf
11 E. Biham and A. Shamir, "Differential Cryptanalysis of the Full 16-Round DES", LNCS 537, page 2-21, 1990.
12 M. Matsui, "Linear Cryptanalysis Method for DES", LNCS 765, page 386-397, 1994.
13 J. Daemen, L. Knudsan, and V. Rijmen, "The Block Cipher Square," Proceeding of FSE`97, LNCS Vol.1267, pp. 149-165, 1997.
14 A. Birynkov, "The Boomerang attack on 5 and 6-round reduced AES", LNCS 3373, page 42-57, 2005.
15 J. Cheon, M. Kim, K. Kim, J. Lee and S. Kang, "Improved impossible differential cryptanalysis of Rijndael and Crypton", LNCS 2288, page 39-49, 2001.
16 L. R. Knudsen, "Truncated and higher order differential," Fast Software Encryption-Second International Workshop, LNCS Vol.1008, pp. 196-211, 1995.