Definition

Rijndael

Contributor(s): Borys Pawliw

Rijndael (pronounced rain-dahl) is the algorithm that has been selected by the U.S. National Institute of Standards and Technology (NIST) as the candidate for the Advanced Encryption Standard (AES). It was selected from a list of five finalists, that were themselves selected from an original list of more than 15 submissions. Rijndael will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years in many cryptography applications. The algorithm was designed by two Belgian cryptologists, Vincent Rijmen and Joan Daemen, whose surnames are reflected in the cipher's name. Rijndael has its origins in Square, an earlier collaboration between the two cryptologists.

The Rijndael algorithm is a new generation symmetric block cipher that supports key sizes of 128, 192 and 256 bits, with data handled in 128-bit blocks - however, in excess of AES design criteria, the block sizes can mirror those of the keys. Rijndael uses a variable number of rounds, depending on key/block sizes, as follows:

9 rounds if the key/block size is 128 bits

11 rounds if the key/block size is 192 bits

13 rounds if the key/block size is 256 bits

Rijndael is a substitution linear transformation cipher, not requiring a Feistel network. It use triple discreet invertible uniform transformations (layers). Specifically, these are: Linear Mix Transform; Non-linear Transform and Key Addition Transform. Even before the first round, a simple key addition layer is performed, which adds to security. Thereafter, there are Nr-1 rounds and then the final round. The transformations form a State when started but before completion of the entire process.

The State can be thought of as an array, structured with 4 rows and the column number being the block length divided by bit length (for example, divided by 32). The cipher key similarly is an array with 4 rows, but the key length divided by 32 to give the number of columns. The blocks can be interpreted as unidimensional arrays of 4-byte vectors.

The exact transformations occur as follows: the byte subtransformation is nonlinear and operates on each of the State bytes independently - the invertible S-box (substitution table) is made up of 2 transformations. The shiftrow transformation sees the State shifted over variable offsets. The shift offset values are dependent on the block length of the State. The mixcolumn transformation sees the State columns take on polynomial characteristics over a Galois Field values (28), multiplied x4 + 1 (modulo) with a fixed polynomial. Finally, the roundkey transform is XORed to the State. The key schedule helps the cipher key determine the round keys through key expansion and round selection.

Overall, the structure of Rijndael displays a high degree of modular design, which should make modification to counter any attack developed in the future much simpler than with past algorithm designs.

Was the best choice really Rijndael?

Our Cryptography expert, Borys Pawliw comments: "The AES selection was always going to be a compromise, balancing various factors such as overall security, performance, and efficiency. As such, it was unlikely that the selection of any one algorithm would receive unanimous praise from all quarters. Rijndael's selection has been criticized by some because the algorithm does not appear to be as secure as some of the other choices.

This criticism is valid theoretically, but does not mean that data secured using this algorithm is going to be unacceptably vulnerable to attack. Although Rijndael may not have been the most secure algorithm from an academic viewpoint, defenders claim that it is more than likely secure enough for all applications in the real world and can be enhanced by simply adding more rounds. Attacks on the algorithm have succeeded only in an extremely limited environment and, while interesting from a mathematical viewpoint, appear to have little consequence in the real world."

This was last updated in May 2007

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

SearchCloudSecurity

• How to effectively manage the cloud logs of security events

Cloud logs of security events produce an abundance of data. Expert Dave Shackleford discusses how to filter through it and get to...

• How the Flip Feng Shui technique undermines cloud security

The Flip Feng Shui attack against hypervisors could have both short and long-term effects on enterprises. Expert Ed Moyle ...

• How cloud endpoint protection products benefit enterprises

Cloud endpoint protection products are outpacing standard endpoint protections. Expert Frank Siemons discusses the evolution of ...

SearchNetworking

• DARPA project could help with mobile security in the enterprise

A DARPA project seeks researchers from academia and business to improve security for mobile networks and devices. The program ...

• Cisco certification changes focus on data center and analytics

Cisco certification changes, effective in January, mean trainees will need to focus more on data center and analytics topics.

• Moving data center strategies: What to consider in an SDDC transition

Accommodating your legacy equipment when shifting to an SDDC takes a lot of time and careful study. What are some strategies to ...

SearchCIO

• Securing a board appointment: CIO requirements and benefits

A corporate board appointment can give a CIO invaluable perspective on running a business, but to get one, deep expertise and a ...

• PrivacyCon: Tech's assault on (obliteration of?) consumer privacy

The attack on consumer privacy by new tech is huge and growing, enabled by consumers and greased by profit; in other words, a ...

• Five analytics priorities for 2017

The International Institute for Analytics recommends embracing AI, clearly defining roles, and finding a balance between ...

SearchConsumerization

• Android, Windows tablets from HP take aim at business users

HP released a new line of tablets targeting business users. The HP Pro Slate 8 and Pro Slate 12 run Android and cost \$449 and ...

• Microsoft to lay off 18,000, Nokia X moves to Windows Phone

Microsoft will lay off 18,000 people over the next year while the Nokia X line of Android smartphones, which was unveiled earlier...

• Microsoft Surface Pro 3 vs. Microsoft Surface Pro 2

Surface Pro 2 and Surface Pro 3 are different enough that Microsoft is keeping both on the market as competing products. Which ...

SearchEnterpriseDesktop

• Prepare for the challenging move to Windows 10

Organizations can cling to past versions of Windows as long as they want. But, eventually, they will have to accept Windows 10, ...

Before making a move to Windows 10, IT admins need to know how licensing, hardware and management are different. They also must ...

• Give Windows 10 disk space a clean sweep

There are multiple ways to keep Windows 10 running smoothly, such as clearing the clutter of old files and applications. A more ...

SearchCloudComputing

• IT shops see cloud computing adoption as a way to disrupt competitors

The fast pace of cloud adoption in 2016 sets the stage for an even more aggressive migration in 2017. Will it help IT shops ...

• Breaking down the costs of cloud storage

Storage is a primary reason enterprises move workloads to the cloud. But before shipping off your data, learn how region, ...

• Evaluate hybrid cloud management tools for your enterprise needs

Selecting hybrid cloud management tools is a complex task. Buyers must consider a long list of criteria such as costs, APIs, ...

ComputerWeekly

• Expanding Doddle picks Cradlepoint to ease pressure on host networks

Click-and-collect service Doddle has implemented a cloud-based all-in-one network model to support its expansion, and be a better...

• GDS declares public cloud secure enough for "vast majority" of public sector

Government Digital Service moves to allay public sector concerns about using off-premise services in a bid to speed up cloud ...

• Lack of diversity risks creating big gaps in AI

A panel discussion at the World Economic Forum has highlighted the need to widen the artificial intelligence developer skills pool

Close