![]() | ||
AES (Rijndael) uses a key schedule to expand a short key into a number of separate round keys. This is known as the Rijndael key schedule. The three AES variants have a different number of rounds. Each variant requires a separate 128-bit round key for each round plus one more. The key schedule produces the needed round keys from the initial key.
Contents
Common operations
Rijndael's key schedule utilizes a number of operations, which will be described before describing the key schedule.
Rotate
The rotate operation takes a 32-bit word like this (in hexadecimal):
1D 2C 3A 4Fand rotates it eight bits to the left such that the high eight bits "wrap around" and become the low eight bits of the result.
2C 3A 4F 1DRcon
Rcon is what the Rijndael documentation calls the exponentiation of 2 to a user-specified value. Note that this operation is not performed with regular integers, but in Rijndael's finite field. In polynomial form, 2 is
in
in
Where i is taken as round number.
For example, the rcon(1) = 1, the rcon(2) = 2, the rcon(3) = 4, and the rcon(9) is the hexadecimal number 0x1b (27 in decimal).
Only the first some of these constants are actually used – up to rcon[10]
for AES-128 (as 11 round keys are needed).
rcon[0]
is not used in AES algorithm.
The Rijndael variants with larger block sizes use more of these constants, up to rcon[29]
for Rijndael with 128-bit keys and 256 bit blocks (needs 15 round keys of each 256 bit, which means 30 full rounds of key expansion, which means 29 calls to the key schedule core using the round constants).
S-box
The key schedule uses Rijndael's S-box.
Key schedule core
This operation is used as an inner loop in the key schedule, and is done in the following manner:
Constants
Since the key schedule for 128-bit, 192-bit, and 256-bit encryption are very similar, with only some constants changed, the following keysize constants are defined here:
Key schedule description
Rijndael's key schedule is done as follows:
- The first n bytes of the expanded key are simply the encryption key.
- The rcon iteration value i is set to 1
- Until we have b bytes of expanded key, we do the following to generate n more bytes of expanded key:
- We do the following to create 4 bytes of expanded key:
- We create a 4-byte temporary variable, t
- We assign the value of the previous four bytes in the expanded key to t
- We perform the key schedule core (see above) on t, with i as the rcon iteration value
- We increment i by 1
- We exclusive-OR t with the four-byte block n bytes before the new expanded key. This becomes the next 4 bytes in the expanded key
- We then do the following three times to create the next twelve bytes of expanded key:
- We assign the value of the previous 4 bytes in the expanded key to t
- We exclusive-OR t with the four-byte block n bytes before the new expanded key. This becomes the next 4 bytes in the expanded key
- If we are processing a 256-bit key, we do the following to generate the next 4 bytes of expanded key:
- We assign the value of the previous 4 bytes in the expanded key to t
- We run each of the 4 bytes in t through Rijndael's S-box
- We exclusive-OR t with the 4-byte block n bytes before the new expanded key. This becomes the next 4 bytes in the expanded key.
- If we are processing a 128-bit key, we do not perform the following steps. If we are processing a 192-bit key, we run the following steps twice. If we are processing a 256-bit key, we run the following steps three times:
- We assign the value of the previous 4 bytes in the expanded key to t
- We exclusive-OR t with the four-byte block n bytes before the new expanded key. This becomes the next 4 bytes in the expanded key