The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2010 vol.8)
pp: 72-74
Joan Daemen , STMicroelectronics
Vincent Rijmen , Katholieke Universiteit Leuven
This article looks at the design and history of the Advanced Encryption Standard, which is based on the block cipher Rijndael.
Advanced Encryption Standard, AES, Rijndael, block ciphers, key-iterated ciphers, symmetric cryptography, Data Encryption Standard, DES, cryptanalysis, SHA-3, Secure Hash Algorithm, algebraic attacks, rebound attacks, related-key attacks, security and privacy
Joan Daemen, Vincent Rijmen, "The First 10 Years of Advanced Encryption", IEEE Security & Privacy, vol.8, no. 6, pp. 72-74, November/December 2010, doi:10.1109/MSP.2010.193
1. Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards (FIPS) Publication 197, US Nat'l Inst. Standards and Technology, 2001.
2. J. Daemen and V. Rijmen, The Design of Rijndael: AES—the Advanced Encryption Standard, Springer, 2002.
3. C. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical J., vol. 28, no. 4, 1949, pp. 656–715.
4. K. Nyberg, "Differentially Uniform Mappings for Cryptography," Advances in Cryptology—Eurocrypt 1993, LNCS 765, Springer, 1993, pp. 55–64.
5. National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, CNSS Policy No. 15, Fact Sheet No. 1, US Nat'l Security Agency, June 2003; CNSS15FS.pdf.
6. E. Barker et al., Recommendation for Key Management Part 1: General (Revised), NIST Special Publication 800-57, US Nat'l Inst. Standards and Technology, Mar. 2007.
7. EMV Integrated Circuit Card Specifications for Payment Systems, Book 2: Security and Key Management, ver. 4.2, EMVCo, June 2008.
8. X. Wang, Y.L. Yin, and H. Yu, "Finding Collisions in the Full SHA-1," Advances in Cryptology—Crypto 2005, LNCS 3621, Springer, 2005, pp. 17–36.
9. L. Keliher and J. Sui, "Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)," IET Information Security, vol. 1, no. 2, 2007, pp. 53–57.
10. W. Zhang, W. Wu, and D. Feng, "New Results on Impossible Differential Cryptanalysis of Reduced AES," Information Security and Cryptology—Icisc 2007, LNCS 4817, Springer, 2007, pp. 239–250.
11. F. Mendel et al., "The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr⊘stl," Fast Software Encryption, LNCS 5665, Springer, 2009, pp. 260–276.
12. A. Biryukov and D. Khovratovich, "Related-Key Cryptanalysis of the Full AES-192 and AES-256," Advances in Cryptology—Asiacrypt 2009, LNCS 5912, Springer, 2009, pp. 1–18.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool