PES32-16 network consisting of sixteen round functions
DOI:
https://doi.org/10.18372/2225-5036.20.6573Keywords:
Feistel network, Lai–Massey scheme, round function, encryption, decryption, multiplicative inverse, additive inverseAbstract
Using the cryptographic methods is one of most effective way to provide information confidentiality. From the viewpoint of modern computation technologies cryptographic algorithms developing and improving (such as block symmetric algorithms) are actual scientific problem. In this paper we develop network PES32-16, consisting of sixteen round functions, which uses the structure of the block cipher algorithm PES. The main advantages of the proposed network are using the same algorithm for encryption and decryption and also ability for using any transformation as a round function.References
Арипов М.М., Туйчиев Г.Н. Сеть PES8–4, состоящая из четырех раундовых функции //Матер. междунар. науч. конф. «Актуальные проблемы прикладной математики и информационных технологий Аль–Хорезми 2012», Том II, Ташкент, 2012. — С. 16-19 .
Арипов М.М., Туйчиев Г.Н. Сеть IDEA4–2, состоящая из двух раундовых функции // Инфокоммуникации: Сети–Технологии–Решения, Ташкент, 2012, №4. — С. 55-59.
Туйчиев Ғ.Н. Сеть IDEA8–4, состоящая из четырех раундовых функции // Инфокомму-никации: Сети–Технологии–Решения, Ташкент, 2013, №2. — С. 55–59.
Туйчиев Ғ.Н. Сеть IDEA32–16, состоящая из шестнадцати раундовых функции // Вестник НУУз. — Ташкент, 2013, №4. — С. 57–61.
Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты. М. : ТРИУМФ, 2003. — 816 с
Lai X., Massey J.L. A proposal for a new block encryption standard. Advances in Cryptology – Advances in Cryptology-EUROCRYPT’90, LNCS 473, Springer-Verlag, Berlin, 1991, pp. 389-404.
Lai X., Massey J.L. Markov ciphers and differential cryptanalysis. Advances in Cryptology, Proceeding EUROCRYPT’91, LNCS 547, Springer-Verlag, 1991, pp. 17-38.
Lai X., Massey J.L. On the design and security of block cipher. ETH series in information processing, v.1, Konstanz: Hartung-Gorre Verlag, 1992.
Nakahara J. On the Design of IDEA-128. http://www.lbd.dcc.ufmg.br/colecoes/sbseg/2005/002.pdf
Nakahara J., Rijmen V., Preneel B., Vandewalle J. The MESH Block Ciphers. The 4th International Workshop on Info. Security Applications, WISA 2003, Springer–Verlag, LNCS 2908, 2003, pp. 458–473
Nakahara J. Faster Variants MESH Block Ciphers. The 5th International Conference on Cryptology in India, INDOCRYPT 2004, Springer–Verlag, LNCS 3348, 2004, pp. 162–174
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.