Development of an Algorithm for Symmetrical Block Ciphering over the Feistel Network Based on Cryptocurrency Basic Table Transformations
Abstract
This article focuses on the development of a symmetric block encryption algorithm using the Feistel network, enhanced by cryptographically stable table-based transformations. The proposed algorithm integrates fundamental transformations of logical operation tables and bit union operations to ensure cryptographic security. It addresses the issue of improving cryptographic stability in block encryption by incorporating innovative table-based transformations, bit concatenation, and cyclic bit shifts. These advancements contribute to both the theoretical foundation and practical implementation of secure encryption algorithms, which can be applied effectively in information communication networks. The results highlight the feasibility and robustness of the algorithm, particularly in hardware and software encryption systems, ensuring efficient cryptographic security for various applications.
References
Алферов А. П., Зубов А. Ю., Кузьмин А. С., Черемушкин А. В. Основы криптографии: Study guide, 2nd edition. –М.: Гелиос АРВ, 2002.- p. 480.
Акбаров Д. Е. Ахборот хавфсизлигини таъминлашнинг криптографик усуллари ва уларнинг қўлланилиши – Тошкент, «Ўзбекистон маркаси», 2009 – p. 434.
Акбаров Д. Е. , Сиддиқов А. А , Тураев Б.Т. Фейстел тармоғи ва унга асосланган симметрик блоклаб шифрлаш алгоритмларини такомиллаштиришнинг фундаментал усуллари. Materials of scientific and technical conference: «Амалий математика ва ахборот хавфсизлиги». 2014 y. April, 28-30. pp. 274-281.
Зензин О. С., Иванов М. А.. Стандарт криптографической защиты – AES. Конечные поля /Под ред. М. А. Иванова – М.: КУДИЦ-ОБРАЗ, 2002. - p. 176.
Акбаров Д. Е. Об одном алгоритме шифрования данных с симметричным ключом. // Инфокоммуникации: Сети-Технологии-Решения. -4(8)/2008. - pp. 25-36.
АкбаровД.Е., Умаров Ш. А. Working out the new algorithm enciphered the data with a symmetric key. // Siberian Federal University. Engineering&Technologies. 2016, 9(2). – pp. 214-224.
Акбаров Д.Е., Мухтаров Ф.М.,Умаров Ш. А .Фундаментальные методы модификации сети Фейстеля алгоритмов шифрования // Information letter of the Karakalpak Branch of the Academy of Sciences of the Republic of Uzbekistan. Nukus. 2016. №4. pp. 13-16.
Акбаров Д.Е., Умаров Ш.А. Новый алгоритм блочного шифрования данных с симметричным ключом. // Вicник НТТУ «КПI». Серiя Приладабудування. -2016.-Vol.: 52(2). pp. 82-91.
Умаров Ш.А. Разработка криптостойких логических и табличных отображений для алгоритмов шифрования. // Dissertation for Doctor of Philosophy in Mathematics (Ph.d). Cypher05.01.05. –Ташкент. Нац. Университет. Докторский Ученый совет DSc 03/30. 12.2019 FM 01.02 Defense succeeded 13.06. 2023.
Акбаров Д.Е., Умаров Ш.А. Электротехнические схемы криптографических табличных преобразований. // Ферганский политехнический институт. Научно-технический журнал. Vol.: 27, №5. 2023. pp. 917.
Dey, C. (2024). Enhancing the Key Recovery Attack on Round Reduced Salsa. IEEE Access, 12, 31736–31744. https://doi.org/10.1109/ACCESS.2024.3367797
Dong, D. (2024). Hardware Implementation of Next Generation Reservoir Computing with RRAM-Based Hybrid Digital-Analog System. Advanced Intelligent Systems. https://doi.org/10.1002/aisy.202400098
Kumar, T. (2019). The cryptographic properties of feistel network-based quasigroups. Advances in Intelligent Systems and Computing, 814, 539–549. https://doi.org/10.1007/978-981-13-1501-5_47
Mogos, G. (2023). Quantum Biometric Fingerprint Encryption Based on Confusion and Feistel Algorithm. 2023 International Conference on Platform Technology and Service, PlatCon 2023 - Proceedings, 53–57. https://doi.org/10.1109/PlatCon60102.2023.10255158
Rahman, M. M. (2024). Practical Implementation of Robust State-Space Obfuscation for Hardware IP Protection. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 32(2), 333–346. https://doi.org/10.1109/TVLSI.2023.3307027
Sorokin, M. (2020). On Integral Distinguishers for Ciphers Based on the Feistel Network Generalizations. Mechanisms and Machine Science, 80, 189–197. https://doi.org/10.1007/978-3-030-33491-8_23
Umarovich, J. G. (2024). Round key formation algorithm for symmetric block encryption algorithms. E3S Web of Conferences, 501. https://doi.org/10.1051/e3sconf/202450102007
Wang, Y. (2024). An image encryption algorithm based on circular rotation and generalized Feistel structure. Soft Computing, 28(5), 4335–4358. https://doi.org/10.1007/s00500-023-08747-z
Zhang, Y. (2022). Cryptanalysis against Type-III Generalized Feistel Networks and Its Variants with SP Type Round Functions. 2022 IEEE 10th International Conference on Information, Communication and Networks, ICICN 2022, 71–76. https://doi.org/10.1109/ICICN56848.2022.10006631