{"title":"基于二维逻辑映射的AES密钥扩展算法","authors":"Dongming Chen, Deding Qing, Dongqi Wang","doi":"10.1109/IWCFTA.2012.81","DOIUrl":null,"url":null,"abstract":"The shortage of original AES key generation and expansion strategy was researched. Based on these researches, the new AES key generation and expansion algorithms are proposed. In these algorithms, two-dimensional Logistic mapping is used to reduce the dependence between sub-keys. Experimental result shows that the security and robustness of the AES sub-keys have been strengthened.","PeriodicalId":354870,"journal":{"name":"2012 Fifth International Workshop on Chaos-fractals Theories and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"AES Key Expansion Algorithm Based on 2D Logistic Mapping\",\"authors\":\"Dongming Chen, Deding Qing, Dongqi Wang\",\"doi\":\"10.1109/IWCFTA.2012.81\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The shortage of original AES key generation and expansion strategy was researched. Based on these researches, the new AES key generation and expansion algorithms are proposed. In these algorithms, two-dimensional Logistic mapping is used to reduce the dependence between sub-keys. Experimental result shows that the security and robustness of the AES sub-keys have been strengthened.\",\"PeriodicalId\":354870,\"journal\":{\"name\":\"2012 Fifth International Workshop on Chaos-fractals Theories and Applications\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fifth International Workshop on Chaos-fractals Theories and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCFTA.2012.81\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fifth International Workshop on Chaos-fractals Theories and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCFTA.2012.81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
AES Key Expansion Algorithm Based on 2D Logistic Mapping
The shortage of original AES key generation and expansion strategy was researched. Based on these researches, the new AES key generation and expansion algorithms are proposed. In these algorithms, two-dimensional Logistic mapping is used to reduce the dependence between sub-keys. Experimental result shows that the security and robustness of the AES sub-keys have been strengthened.