IJCNIS Vol. 9, No. 4, 8 Apr. 2017
Cover page and Table of Contents: PDF (size: 583KB)
Full Text (PDF, 583KB), PP.29-36
Views: 0 Downloads: 0
Block Cipher, Symmetric Cipher, Advance Encryption Standard (AES), Substitution and Permutation Network (SPN), Feistel Structure (FS)
In this paper, we have proposed a new iterated symmetric cipher, which is designed with Substitution and Permutation Network (SPN) structure and depends on strong mathematical built. It uses a compact algorithm for encryption and decryption processes, which consists of four main stages that roughly similar in its work to the Advance Encryption Standard (AES) stages. Starting by the SubByte operation, ReversibleShiftrows operation, ReversibleMixcolumns operation, and Round key addition. The proposed operations in this cipher have implemented in a straightforward manner relatively in both Encryption/Decryption by an elegant way. These four stages designed to reduce the hardware requirements and to produces high efficiency, which keeps the encryption and decryption process at the same speed in the hardware devices and eliminates the difference of execution times as well as creates a balance in forward and backward operations. The proposed cipher interested with modern design by adopted new algebraic operations and clear mathematical notations to ensure a high level of security. The proposed cipher did not build suddenly or arbitrarily but it acts as a sequence of developments and represents as a long process of design for long time, since several proposed ciphers have been published recently by us that paved the way to its new design, so the designed cipher inherited a good properties from a proven famous algorithms’ features to produce high resistance against all known attacks and to submit a high performance on many platforms and in a wide range of hardware and software applications.
Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen, "New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.4, pp. 29-36, 2017. DOI:10.5815/ijcnis.2017.04.04
[1]Christof Paar Jan Pelzl, “Understanding Cryptography” A Textbook for Students and Practitioners? Springer-Verlag Berlin Heidelberg 2010.
[2]Sourabh Chandra and Siddhartha et al, “A Study and Analysis on Symmetric Cryptography”, International Conference on Science, Engineering and Management Research (ICSEMR 2014), 978-1-4799-7613-3/14/$31.00 ?2014 IEEE.
[3]Olivier Baudron et al, "Report on the AES Candidates", Second AES Candidate Conference (AES2), Rome, Italy, March 22, 1999.
[4]Cetin Kaya Koc, “Cryptographic Engineering“, Library of Congress Control Number: 2008935379, © Springer Science + Business Media, LLC 2009.
[5]Svenja Huntemann, “The upper bound of general Maximum Distance Separable codes”, University of New Brunswick Saint John, Faculty of Science, Applied Science, and Engineering, Math 4200: Honours Project, May 28, 2012.
[6]Bac Do Thi, Minh Nguyen Hieu and Duy Ho Ngoc, “An Effective and Secure Cipher Based on SDDO”, DOI: 10.5815/ijcnis.2012.11.01, I. J. Computer Network and Information Security, 2012, 11, 1-10.
[7]Nicolas Sklavos and Xinmiao Zhang,” Wireless Security and Cryptography Specifications and Implementations”, © 2007 by Taylor & Francis Group, LLC.
[8]Thomas W. Cusick and Pantelimon Stanica, “Cryptographic Boolean Functions and Applications”, Copyright ? 2009 Elsevier Inc. All rights reserved.
[9]Boris Ryabko and Andrey Fionov, “BASICS OF C O N T E M P O R A R Y CRYPTOGRAPHY FOR IT PRACTITIONERS”, Series on Coding Theory and Cryptology - Vol. 1, Copyright Q 2005 by World Scientific Publishing Co. Re. Ltd.
[10]Andrey Bogdanov, “On unbalanced Feistel networks with contracting MDS diffusion”, DOI 10.1007/s10623-010-9462-0, Des. Codes Cryptogr. (2011) 59:35–58.
[11]Jiali Choy Guanhan Chew Khoongming Khoo and Huihui Yap, “Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure”, DOI 10.1007/s12095-011-0042-6, Cryptogr. Commun. (2011) 3:141–164.
[12]Xueying Zhang, H. M. Heys and Cheng Li, “FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks, DOI 10.1007/s11036-012-0353-7, ? Springer Science+Business Media, LLC 2012
[13]Debra L. Cook Moti Yung Angelos D. Keromytis, “Elastic block ciphers: method, security and instantiations”, Int. J. Inf. Secur. (2009) 8:211–231 DOI 10.1007/s10207-008-0075-9, ? Springer-Verlag 2008.
[14]M. Liskov, R. L. Rivest, and D.Wagner, “Tweakable block ciphers,” in Proc. CRYPTO (Lecture Notes in Computer Science), M. Yung, Ed. Berlin, Germany: Springer-Verlag, 2002, vol. 2442, pp. 31–46.
[15]Palash Sarkar, “Tweakable enciphering schemes using only the encryption function of a block cipher”, Information Processing Letters 111 (2011) 945–955, ? 2011 Elsevier B.V.
[16]Omar A. Dawood, Abdul Monem S. Rahma and Abdul Mohsen J. Abdul Hossen, “The New Block Cipher Design (Tigris Cipher)”, I.J.Computer Network and Information Security (IJCNIS), Published Online November 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2015.12.02.
[17]Omar A. Dawood, Abdul Monem S. Rahma and Abdul Mohsen J. Abdul Hossen, “The Euphrates Cipher”, IJCSI International Journal of Computer Science Issues, Volume 12, Issue 2, March 2015, ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784.
[18]Ronald L. Rivest1, M.J.B. Robshaw and Yiqun Lisa Yin, "The Security of the RC6TM Block Cipher", RSA Laboratories Version 1.0, August 20, 1998.
[19]Ali M. Sagheer, Salah S. Al-Rawi, and Omar A. Dawood, “Proposing of Developed Advanced in Encryption Standard AES”, IEEE Computer Society DOI 10.1109/DESE, Page No. 197, 2011, The Fourth International Conference in Developments in E System Engineering DESE, Dubai, 2011.