A Proposed Non Feistel Block Cipher Algorithm

توێژەران

  • Ahssan Ahmed Mohammed Department of software, College IT, University of Babylon - Iraq
  • Abdulkareem O. Ibad Department Computer Engineering, Baghdad College for Economic Sciences University - Iraq

##semicolon##

https://doi.org/10.25212/lfu.qzj.2.2.09

##semicolon##

Encryption, Decryption, Block cipher, Keys, SubKey, Map Function, Wave Function, Permutation.

پوختە

In this work, A proposed block cipher algorithm is designed with multiple of 32 bits as a length of block performed in heterogonous multiple block cipher dependent on the application field , Multiple of 48 bits as a key length are entered automatically used in variable permutation, addition function and xor operation. A proposed algorithm performed in single round to giving fast and high security algorithm used in different Purposes. Another proposed functions for different purpose such as Balance Function between balance fixed number and initial permutation and inverse initial permutation, Maps function as lookup table (map2,map3,map4 and map5). Wave Function as a nonlinear function of 8-bits of input and same for the output. This algorithm can be designed in several blocks length depends on the application field, increase speed, higher complexity and for reduction of cost.

##plugins.generic.usageStats.downloads##

##plugins.generic.usageStats.noStats##

سەرچاوەکان

- Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: A lightweight block cipher for multiple platforms. In Selected Areas in Cryptography - SAC 2012. LNCS, vol. 7707, pp. 339-354. Springer, Heidelberg (2013).

- Wu, W., Zhang, L.: Lblock: A lightweight block cipher. In Applied Cryptography and Network Security - ACNS 2011. LNCS vol. 6715, pp. 327-344. Springer, Heidelberg (2011).

- van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security. Springer. ISBN 978-1-4419-5905-8., p. 455.

- Junod, Pascal & Canteaut, Anne (2011). Advanced Linear Cryptanalysis of Block and Stream Ciphers. IOS Press. p. 2. ISBN 9781607508441.

- Chakraborty, D. & Rodriguez-Henriquez F. (2014). "Block Cipher Modes of Operation from a Hardware Implementation Perspective". In Koç, Çetin K. Cryptographic Engineering. Springer. p. 321. ISBN 9780387718163.

- Lars R. Knudsen and John Erik Mathiassen, On the Role of Key Schedules in Attacks on Iterated Ciphers, ESORICS 2014, pp322–334

- Dr.Abdulkareem O. Ibadi, Special Security e-Mail System , Ph.D. dissertation, University of Technology , June 2007

- Ben Morris, Phillip Rogaway, Till Stegers. "How to Encipher Messages on a Small Domain". CRYPTO 2010.

- Menezes, Alfred J., Oorschot, Paul C. van; Vanstone, Scott A. (2011). Handbook of Applied Cryptography (Fifth ed.). p. 251.

- Christof Paar, Jan Pelzl, "The Data Encryption Standard (DES) and Alternatives", free online lectures on Chapter 3 of "Understanding Cryptography, A Textbook for Students and Practitioners". Springer, 2012.

- "Principles and Performance of Cryptographic Algorithms" by Bart Preneel, Vincent Rijmen, and Antoon Bosselaers.

- "The Skein Hash Function Family" 2010 by Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker page 40.

- Sinha, S., Arya, C. (2012). Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box. Defence Science Journal, 62(1).

- Paar, C., Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. New York City, New York: Springer Publishing.

- Grocholewska-Czurylo, A. (2011). Cryptographic properties of modified AES-like S-boxes.

- Annales UMCS Informatica, AI XI(2), 37-48. DOI: 10.2478/v10065-011-0009-4.

- Easttom, C. (2015). Modern Cryptography. New York City, New York: McGraw Hill.

##submission.downloads##

بڵاو کرایەوە

2021-01-24

ژمارە

بەش

Articles