A five‐round algebraic property of AES and its application to the ALPHA‐MAC
Source: International Journal of Applied Cryptography, Volume 1, Number 4, 31 August 2009 , pp. 264-289(26)
Publisher: Inderscience Publishers
Abstract:We present a five‐round algebraic property of the advanced encryption standard (AES), and we show that this algebraic property can be used to analyse the internal structure of ALPHA‐MAC whose underlying block cipher is AES. In the proposed property, we modify 20 bytes from five intermediate values at some fixed locations in five consecutive rounds, and we show that after five rounds of operations, such modifications do not change the intermediate result and finally, still produce the same ciphertext. By employing the proposed five‐round algebraic property of AES, we provide a method to find second preimages of the ALPHA‐MAC based on the assumption that a key or an intermediate value is known. We also show that our idea can also be used to find internal collisions of the ALPHA‐MAC under the same assumption.
Keywords: Applied and Computational Mathematics; COMPUTING AND MATHEMATICS JOURNALS; Communications and Mobile Technology; Computing Science, Applications and Software; Information Systems and Technology; Internet and Web Services
Document Type: Research Article
Affiliations: 1: Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia. 2: Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia
Publication date: 31 August 2009
- Information security is important to the rapid growth of the Internet and advances of computer systems. However, existing journals on information security mainly focus on either theory or specific areas of information and computer security.
The International Journal of Applied Cryptography aims to introduce new ground between these two areas. It proposes and fosters discussion on cryptographic algorithms and protocols that are directly applicable.
- Information for Authors
- Submit a Paper
- Subscribe to this Title
- Terms & Conditions
- ingentaconnect is not responsible for the content or availability of external websites