In How Many Ways Can You Write Rijndael?

In this paper we ask the question what happens if we replace all the constants in Rijndael, including the replacement of the irreducible polynomial, the coefficients of the MixColumn operation, the affine transformation in the S box, etc. We show that such replacements can create new dual ciphers, which are equivalent to the original in all aspects. We present several such dual ciphers of Rijndael, such as the square of Rijndael, and dual ciphers with the irreducible polynomial replaced by primitive polynomials. We also describe another family of dual ciphers consisting of the logarithms of Rijndael.We then discuss self-dual ciphers, and extend our results to other ciphers.

[1]  Eli Biham,et al.  The Book of Rijndaels , 2002, IACR Cryptol. ePrint Arch..

[2]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[3]  Shai Halevi,et al.  Scream: A Software-Efficient Stream Cipher , 2002, FSE.

[4]  Niels Ferguson,et al.  A Simple Algebraic Representation of Rijndael , 2001, Selected Areas in Cryptography.

[5]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[6]  Mitsuru Matsui,et al.  Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis , 2000, Selected Areas in Cryptography.

[7]  Vincent Rijmen,et al.  The KHAZAD Legacy-Level Block Cipher , 2001 .

[8]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[9]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[10]  Kenneth H. Rosen Handbook of Discrete and Combinatorial Mathematics , 1999 .

[11]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.

[12]  Eli Biham,et al.  Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.

[13]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[14]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[15]  Vincent Rijmen,et al.  The Cipher SHARK , 1996, FSE.

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.