About networks PES32-8, PES32-4, PES32-2 and PES32-1, created on the basis of network PES32-16
DOI:
https://doi.org/10.18372/2225-5036.20.7303Keywords:
Feistel network, Lai-Massey scheme, round function, encryption, decryption, multiplicative inverse, additive inverseAbstract
In the paper on the basis of the network PES32-16 networks PES32-8, PES32-4, PES32-2 and PES32-1 were developed – these consisting of eight, four, two, and one round function. Round function of network PES32-8 has two input and output blocks, the round function PES32-4 network has four input and output blocks, the round function PES32-2 network has eight input and output blocks and the round function network PES32-1 has sixteen input and output blocks. The main advantage of the proposed network is that encryption and decryption can use the same algorithm and as well as a round function can be any transformation.References
Туйчиев Г.Н. Сеть PES4–2, состоящая из двух раундовых функции // Проблемы информатики и энергетики. — Ташкент. — 2013. — №5-6. — С. 17-111.
Арипов М.М., Туйчиев Г.Н. Сеть PES8–4, состоящая из четырех раундовых функции // Материалы международной научной конференции «Актуальные проблемы прикладной математики и информационных технологий Аль-Хоразми 2012», Том № II, — Ташкент. — 2012. — С. 16–19.
Туйчиев Г.Н. Сеть PES32–16, состоящая из шестнадцати раундовых функции / Г.Н. Туйчиев // Безпека інформації. — Том 20, №1. — 2014. — С. 43–47.
Арипов М.М., Туйчиев Г.Н. Сеть IDEA4–2, состоящая из двух раундовых функции // Инфокоммуникации: Сети–Технологии–Решения. –Ташкент. — 2012. — №4. — С. 55–59.
Туйчиев Г.Н. Сеть IDEA8–4, состоящая из четырех раундовых функции // Инфо-коммуникации: Сети–Технологии–Решения. –Тошкент. —2013. — №2. — С. 55–59.
Туйчиев Г.Н. Сеть IDEA16–8, состоящая из восьми раундовых функции //Вестник ТашГТУ. –Тошкент. — 2014. — №1. — С. 183–187.
Туйчиев Ғ.Н. Сеть IDEA32–16, состоящая из шестнадцати раундовых функции // Вестник НУУз. – Тошкент. — 2013. — №4. — С. 57–61.
Lai X., Massey J.L. A proposal for a new block encryption standard //Advances in Cryptology — Proc. Eurocrypt’90, LNCS 473, Springer–Verlag, 1991, pp. 389–404
Lai X., Massey J.L. On the design and security of block cipher //ETH series in information processing, v.1, Konstanz: Hartung–Gorre Verlag, 1992.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.