A modified version of Rijndael algorithm implemented to analyze the cyphertexts correlation for switched S-Boxes

There are more than eleven years since Rijndael algorithm was declared the winner of the NIST contest for the new AES election. All this time the original algorithm was analyzed and attacked by cryptanalysts and hackers in order to find its vulnerabilities. The modified version of Rijndael we analyze in this paper randomly changes the accessing order of S-Boxes implemented in the source code of the original algorithm, due to affine transformation and inverse matrix properties. The goal is to obtain two different cyphertexts, keeping the plaintext and the secret key. For this to be possible, a PRNG designed by Gorge Marsaglia was implemented in the software solution.

[1]  Jongsung Kim,et al.  Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 , 2007, FSE.

[2]  Marine Minier,et al.  Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks , 2009, AFRICACRYPT.

[3]  Alex Biryukov,et al.  Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.

[4]  Wen-Ling Wu,et al.  Improved Integral Attacks on Rijndael , 2011, J. Inf. Sci. Eng..

[5]  Jongsung Kim,et al.  Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 , 2005, FSE.

[6]  William Hugh Murray,et al.  Modern Cryptography , 1995, Information Security Journal.

[7]  Vincent Rijmen,et al.  Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers , 2009, Computing.

[8]  Elisabeth Oswald,et al.  An Efficient Masking Scheme for AES Software Implementations , 2005, WISA.

[9]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[10]  Johannes Blömer,et al.  Provably Secure Masking of AES , 2004, IACR Cryptol. ePrint Arch..

[11]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[12]  David A. Wagner,et al.  Integral Cryptanalysis , 2002, FSE.

[13]  Christophe Clavier,et al.  Improved Collision-Correlation Power Analysis on First Order Protected AES , 2011, CHES.

[14]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[15]  De Wang,et al.  Replacement and Structure of S-Boxes in Rijndael , 2008, 2008 International Conference on Computer Science and Software Engineering.

[16]  Keshab K. Parhi,et al.  Implementation approaches for the Advanced Encryption Standard algorithm , 2002 .

[17]  Thomas S. Messerges,et al.  Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.

[18]  Raphael C.-W. Phan,et al.  New Multiset Attacks on Rijndael with Large Blocks , 2005, Mycrypt.

[19]  Bruce Schneier,et al.  Improved Cryptanalysis of Rijndael , 2000, FSE.

[21]  Eli Biham,et al.  Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.

[22]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[23]  Pushpa R. Suri,et al.  Design of a Modified Rijndael Algorithm Using 2D Rotations , 2011 .

[24]  Akashi Satoh,et al.  A Compact Rijndael Hardware Architecture with S-Box Optimization , 2001, ASIACRYPT.

[25]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .