A Proposed Non Feistel Block Cipher Algorithm
DOI:
https://doi.org/10.25212/lfu.qzj.2.2.09Keywords:
Encryption, Decryption, Block cipher, Keys, SubKey, Map Function, Wave Function, Permutation.Abstract
In this work, A proposed block cipher algorithm is designed with multiple of 32 bits as a length of block performed in heterogonous multiple block cipher dependent on the application field , Multiple of 48 bits as a key length are entered automatically used in variable permutation, addition function and xor operation. A proposed algorithm performed in single round to giving fast and high security algorithm used in different Purposes. Another proposed functions for different purpose such as Balance Function between balance fixed number and initial permutation and inverse initial permutation, Maps function as lookup table (map2,map3,map4 and map5). Wave Function as a nonlinear function of 8-bits of input and same for the output. This algorithm can be designed in several blocks length depends on the application field, increase speed, higher complexity and for reduction of cost.
Downloads
References
- Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: A lightweight block cipher for multiple platforms. In Selected Areas in Cryptography - SAC 2012. LNCS, vol. 7707, pp. 339-354. Springer, Heidelberg (2013).
- Wu, W., Zhang, L.: Lblock: A lightweight block cipher. In Applied Cryptography and Network Security - ACNS 2011. LNCS vol. 6715, pp. 327-344. Springer, Heidelberg (2011).
- van Tilborg, Henk C. A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security. Springer. ISBN 978-1-4419-5905-8., p. 455.
- Junod, Pascal & Canteaut, Anne (2011). Advanced Linear Cryptanalysis of Block and Stream Ciphers. IOS Press. p. 2. ISBN 9781607508441.
- Chakraborty, D. & Rodriguez-Henriquez F. (2014). "Block Cipher Modes of Operation from a Hardware Implementation Perspective". In Koç, Çetin K. Cryptographic Engineering. Springer. p. 321. ISBN 9780387718163.
- Lars R. Knudsen and John Erik Mathiassen, On the Role of Key Schedules in Attacks on Iterated Ciphers, ESORICS 2014, pp322–334
- Dr.Abdulkareem O. Ibadi, Special Security e-Mail System , Ph.D. dissertation, University of Technology , June 2007
- Ben Morris, Phillip Rogaway, Till Stegers. "How to Encipher Messages on a Small Domain". CRYPTO 2010.
- Menezes, Alfred J., Oorschot, Paul C. van; Vanstone, Scott A. (2011). Handbook of Applied Cryptography (Fifth ed.). p. 251.
- Christof Paar, Jan Pelzl, "The Data Encryption Standard (DES) and Alternatives", free online lectures on Chapter 3 of "Understanding Cryptography, A Textbook for Students and Practitioners". Springer, 2012.
- "Principles and Performance of Cryptographic Algorithms" by Bart Preneel, Vincent Rijmen, and Antoon Bosselaers.
- "The Skein Hash Function Family" 2010 by Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker page 40.
- Sinha, S., Arya, C. (2012). Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box. Defence Science Journal, 62(1).
- Paar, C., Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. New York City, New York: Springer Publishing.
- Grocholewska-Czurylo, A. (2011). Cryptographic properties of modified AES-like S-boxes.
- Annales UMCS Informatica, AI XI(2), 37-48. DOI: 10.2478/v10065-011-0009-4.
- Easttom, C. (2015). Modern Cryptography. New York City, New York: McGraw Hill.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Ahssan Ahmed Mohammed, Abdulkareem O. Ibad
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission