a novel block cipher algorithm with feistel-like structure

نویسندگان

mahmood deypir

yousef purebrahim

چکیده

block ciphers have wide applications for hardware and software implementations. in this paper, a new block cipher algorithm with provable security is proposed. the whole structure of the algorithm is novel and has a good encryption and decryption performance. additionally, it has good security with few number of rounds. the structure of the proposed algorithm consists of 4-rounds feistel-like which uses 3-rounds feistel type functions. moreover, a new method for mds (maximal distance separable) matrix construction is proposed and used in the round function as a linear layer. furthermore, some considerations in s-boxes of the algorithm lead to obtaining better algebraic expression than aes s-boxes. the algorithm has a high margin of security against various cryptanalysis methods due to using specific functions in its round functions. our theoretical evaluations shows that the devised cipher algorithm has provable security against attacks based on linear and differential cryptanalysis and it is robust against differential, truncated differential, boomerang, and integral cryptanalysis in terms of practical security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Feistel Cipher Involving

In the present investigation, we developed a novel Feistel cipher by dividing the plaintext into a pair of matrices. In the process of encryption, we have used a bunch of keys and modular arithmetic addition. The avalanche effect shows that the cipher is a strong one. The cryptanalysis carried out on this cipher indicates that this cipher cannot be broken by any cryptanalytic attack and it can ...

متن کامل

Elastic Block Ciphers: The Feistel Cipher Case

We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differently, such as occurs in a Feistel network and in MISTY1. We focus on how specific bits are selected to be swapped after each round when forming the elastic version, using an elastic version of MISTY1 and differential cryptanalysis to illustrate why this swap step must be ca...

متن کامل

Feistel-type Block Cipher by Bacteria Engineering

In this paper we propose a theoretical method for breaking a block cipher based on a Feistel structure which is a variant of DES (S-DES) using one pair of (plaintext, ciphertext). Our scheme utilizes bacterial computing for the first time in cryptanalysis. For this reason, we design and simulate an engineered gene regulatory network to break S-DES which possesses a superior performance than the...

متن کامل

Unbalanced Feistel Networks and Block Cipher Design

We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks has interesting implications for designing...

متن کامل

A Novel Feistel Cipher Involving a Bunch of Keys

In this investigation, we have developed a novel block cipher by modifying classical Feistel cipher. In this, we have used a key bunched wherein each key has a multiplicative inverse. The cryptanalysis carried out in this investigation clearly shows that this cipher cannot be broken by any attack. Keywords-encryption; decryption; cryptanalysis; avalanche effect; multiplicative inverse.

متن کامل

A Modified Feistel Cipher Involving

In this paper, we have developed a modification to the Feistel cipher by taking the plaintext in the form of a pair of matrices and introducing a set of functions namely, substitute, shifting of rows, mixing of columns and XOR operation with a key. Further we have supplemented this process by using another function called shuffling at the end of each round of the iteration process. In this anal...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of computing and security

جلد ۳، شماره ۱، صفحات ۰-۰

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023