The development of block encryption algorithm based on IDEA32-4 and RFWKIDEA32-4 networks using transformation of the encryption algorithm AES
DOI:
https://doi.org/10.18372/2225-5036.21.8733Keywords:
cryptography, symmetric algorithm, transformation, round, round function, key, encryption, decryptionAbstract
Today one of the most effective symmetric block ciphers is AES. In the paper block encryption algorithms AES-IDEA32-4 and AES-RFWKIDEA32-4 on the basis of networks IDEA32-4 and RFWKIDEA32-4 were developed. In the encryption algorithm AES-IDEA32-4 as a round function were selected transformation SubBytes(), ShiftRows(), MixColumns(), AddRoundKey(), and in the encryption algorithm AES-RFWKIDEA32-4 as a round function were selected transformation SubBytes(), ShiftRows(), MixColumns(). The block length of encryption algorithm is 512 bits, the number of rounds is 10, 12, 14 and key length changes from 256 bits to 1024 bits with a step of 128 bits.References
Арипов М.М., Туйчиев Г.Н. Сеть IDEA4–2, состоящая из двух раундовых функций // Инфокоммуникации: Сети–Технологии–Решения. –Ташкент. – 2012. – №4 (24). – С. 55–59.
ГОСТ 28147–89. Государственный Стандарт СССР. Системы обработки информации. Защита криптографическая. Алгоритм криптографического преобразования.
Туйчиев Г.Н. О сетях IDEA32–8, IDEA32–4, IDEA32–2, IDEA32–1, созданных на основе сети IDEA32–16 // Инфокоммуникации: Сети–Технологии–Решения. – Ташкент. – 2014. – №2 (30). – С. 45–50.
Tuychiev G.N. To the networks RFW-KIDEA32–16, RFWKIDEA32–8, RFWKIDEA32–4, RFWKIDEA32–2 and RFWKIDEA32–1, based on the network IDEA32–16 // International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 1, March 2015, pp. 9-20.
Туйчиев Г.Н. Сети RFWKIDEA4–2, IDEA4–1 и RFWKIDEA4–1 // Вестник Туринского политех-нического университета в городе Ташкента. – 2013. – №3. – С. 71-77.
Туйчиев Г.Н. О сетях PES4–1 и RFWKPES4–2, RFWKPES4–1, разработанных на основе сети PES4–2 // Узбекский журнал проблемы информатики и энергетики. – Тaшкент. – 2015. – №1. – C. 97–103.
Туйчиев Г.Н. Создание блочного алгоритма шифрования на основе сети IDEA4–2, с использованием раундовой функции алгоритма шифрования ГОСТ 28147–89 // Инфокоммуникации: Сети–Технологии–Решения. – Ташкент. – 2014. – №4 (32). – С. 49–54.
Туйчиев Г.Н. О сетях IDEA8–2, IDEA8–1 и RFWKIDEA8–4, RFWKIDEA8–2, RFWKIDEA8–1, разработанные на основе сети IDEA8–4 // Узбекский математический журнал. – Ташкент. – 2014. – №3. – С. 104–118.
Туйчиев Г.Н. О сетях PES8–2 и PES8–1, разработанные на основе сети PES8–4 // Труды международной конференции «Aктуальные проблемы прикладной математики и информационных технологий–Аль–Хорезми 2014», Том 2. –Самарканд. – 2014. – C. 28–32.
Туйчиев Г.Н. О сетях RFWKPES8–4, RFWKPES8–2, RFWKPES8–1, разработанные на основе сети PES8–4 // Труды междунар. конференции «Aктуальные проблемы прикладной математики и информационных технологий–Аль–Хорезми 2014». – Том 2. – Самарканд. – 2014. – C. 32–36.
Туйчиев Г.Н. О сетях IDEA16–4, IDEA16–2, IDEA16–1, созданных на основе сети IDEA16–8 // Сборник тезисов и докладов республиканского семинара «Информационная безопасность в сфере связи и информатизации. Проблемы и пути их решения». –Ташкент, 2014 г.
Туйчиев Г.Н. О сетях PES32–8, PES32–4, PES32–2 и PES32–1, созданных на основе сети PES32–16 // Безопасность информации, –Киев, 2014. Том 20, №2, c. 164–168.
Туйчиев Г.Н. О сетях RFWKPES32–8, RFWKPES32–4, RFWKPES32–2 и RFWKPES32–1, созданных на основе сети PES32–16 // Сборник тезисов и докладов республиканского семинара «Информационная безопасность в сфере связи и информатизации. Проблемы и пути их решения». –Ташкент. – 2014.
Daeman J., Rijmen V. AES Proposal: Rijndael // NIST AES Proposal, 1998, http://csrc.nist.gov / Daeman J., Rijmen V. The Block Cipher Rijndael // Third Smart CardResearch and Advanced Applications Conference Proceedings, 1998.
Tuychiev G. Creating a encryption algorithm based on network RFWKIDEA4–2 with the use the round function of the GOST 28147-89 // International Conference on Emerging Trends in Technology, Science and Upcoming Research in Computer Science (ICDAVIM-2015) printed in International Journal of Advanced Technology in Engineering and Science, 2015, vol. 3, №1, pp. 427-432.
Tuychiev G. Creating a encryption algorithm based on network RFWKPES4–2 with the use the round function of the GOST 28147–89 // International Journal of Multidisciplinary in Cryptology and Information Security, 2015, vol.4., №2, pp. 14-17.
Tuychiev G. New encryption algorithm based on network IDEA8-1 using of the transformation of the encryption algorithm AES // IPASJ International Journal of Computer Science, 2015, Volume 3, Issue 1, pp. 1-6.
Tuychiev G. New encryption algorithm based on network RFWKIDEA8-1 using transformation of AES encryption algorithm // International Journal of Computer Networks and Communications Security, 2015, Vol. 3, №. 2, pp. 43–47.
Tuychiev G. New encryption algorithm based on network PES8-1 using of the transformations of the encryption algorithm AES // International Journal of Multidisciplinary in Cryptology and Information Security, 2015, vol.4., №1, pp. 1-5.
Tuychiev G. New encryption algorithm based on network RFWKPES8-1 using of the transformations of the encryption algorithm AES // International Journal of Multidisciplinary in Cryptology and Information Security, 2014, vol.3., №6, pp. 31-34.
Tuychiev G. New encryption algorithm based on network IDEA16-1 using of the transformation of the encryption algorithm AES // IPASJ International Journal of Information Technology, 2015, vol. 3, Issue 1, pp. 6-12.
Туйчиев Г.Н. Создание блочного алгоритма шифрования на основе сетей PES32–1 и RFWKPES32–1 с использованием преобразования
алгоритма шифрования AES // Сборник научных работы научно-практической конференции «Актуальные вопросы обеспечения кибернетической безопасности и защиты информации- CICSIS-2015», Киев, 25-28 февраля 2015. – С. 101-112.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.