The encryption algorithms GOST28147–89–IDEA8–4 and GOST28147–89–RFWKIDEA8–4

Authors

  • Gulom Numovych Tuychiev National university of Uzbekistan

DOI:

https://doi.org/10.18372/2410-7840.19.11199

Keywords:

Lai–Massey scheme, round function, round keys, output transformation, multiplication, addition, S–box

Abstract

In this paper there were created new encryption algorithms GOST28147–89–IDEA8–4 and GOST28147–89–RFWKIDEA8–4 based on networks IDEA8–4 and RFWKIDEA8–4, with the use the round function of the encryption algorithm GOST 28147–89. The block length of encryption algorithm is 256 bits, the number of rounds is 8, 12, 16 and length of the key switches from 256 to 1024 bits. Depending on information privacy and encryption speed can we choose the number of rounds and key length. In the encryption algorithms encryption and decryption use the same algorithm, only when decryption calculates the inverse of round keys depending on operations and they are applied in reverse order.

Author Biography

Gulom Numovych Tuychiev, National university of Uzbekistan

PhD, teacher of National university of Uzbekistan, Tashkent

References

Aripov M., Tuychiev G. The network IDEA4–2, consists from two round functions // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2012, №4 (24), pp. 55–59.

Aripov M., Tuychiev G. The network PES8–4, consists from four round functions // Materials of the international scientific conference конференции «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2012», Volume № II, –Tashkent, 2012, pp. 16–19.

Aripov M., Tuychiev G. Development block encryption algorithm based networks IDEA16–2 and RFWKIDEA16–2 using the transformation of encryption algorithm AES // «Information Security in the light of the Strategy Kazakhstan-2050»: proceedings III International scientific-practical conference (15-16 October 2015, Astana). - Astana, 2015. pp. 40-60

Aripov M., Tuychiev G. The encryption algorithm AES–PES32–4 based on network PES32–4 // Transactions of the international scientific conference «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2016», Volume № 2, –Buchara, 2016, pp. 28–34

Aripov M., Tuychiev G. The Encryption Algorithm AES-RFWKPES32-4 // International Journal of Electronics and Information Engineering, Vol.5, No.1, -pp.20-29

Bakhtiyorov U., Tuychiev G. About Generation Resistance S-Box And Boolean Function On The Basis Of Nyberg Construction // Materials scientific-technical conference «Applied mathematics and information security», Tashkent, 2014, 28–30 april, -pp. 317–324

Daeman J., Rijmen V. AES Proposal: Rijndael // NIST AES Proposal, http://csrc.nist.gov/. 1998

GOST 28147–89. National Standard of the USSR. Information processing systems. Cryptographic protection. Algorithm cryptographic transformation

Lai X., Massey J. On the design and security of block cipher. ETH series in information processing, v.1. 1992

Tuychiev G. The networks RFWKIDEA4–2, IDEA4–1 and RFWKIDEA4–1 // Acta of Turin polytechnic university in Tashkent, 2013, №3, pp. 71-77

Tuychiev G.N. The network IDEA8–4, consists from four round functions // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2013, №2 (26), pp. 55–59.

Tuychiev G. About networks IDEA8–2, IDEA8–1 and RFWKIDEA8–4, RFWKIDEA8–2, RFWKIDEA8–1 developed on the basis of network IDEA8–4 // Uzbek mathematical journal, –Tashkent, 2014, №3, pp. 104–118

Tuychiev G. About networks IDEA16–4, IDEA16–2, IDEA16–1, created on the basis of network IDEA16–8 // Compilation of theses and reports republican seminar «Information security in the sphere communication and information. Problems and their solutions» –Tashkent, 2014

Tuychiev G. About networks RFWKIDEA16–8, RFWKIDEA16–4, RFWKIDEA16–2, RFWKIDEA16–1, created on the basis network IDEA16–8 // Ukrainian Scientific Journal of Information Security, –Kyev, 2014, vol. 20, issue 3, pp. 259–263

Tuychiev G. About networks IDEA32–8, IDEA32–4, IDEA32–2, IDEA32–1, created on the basis of network IDEA32–16 // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2014. №2 (30), pp. 45–50.

Tuychiev G. To the networks RFWKIDEA32–16, RFWKIDEA32–8, RFWKIDEA32–4, RFWKIDEA32–2 and RFWKIDEA32–1, based on the network IDEA32–16 // International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 1, March 2015, pp. 9-20

Tuychiev G. The network PES4–2, consists from two round functions // Uzbek journal of the problems of informatics and energetics. –Tashkent, 2013, №5–6, pp. 107–111

Tuychiev G. About networks PES4–1 and RFWKPES4–2, RFWKPES4–1 developed on the basis of network PES4–2 // Uzbek journal of the problems of informatics and energetics. –Tashkent, 2015, №1-2, pp. 100-105.

Tuychiev G.N. About networks PES8–2 and PES8–1, developed on the basis of network PES8–4 // Transactions of the international scientific conference «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2012», Volume № II, – Samarkand, 2014, pp. 28–32.

Tuychiev G.N. About networks RFWKPES8–4, RFWKPES8–2, RFWKPES8–1, developed on the basis of network PES8–4 // Transactions of the international scientific conference «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2012», Volume № 2, –Samarkand, 2014, pp. 32–36

Tuychiev G.N. About networks PES16–4, PES16–2 and PES16–1, created on the basis network PES16–8 // Ukrainian Information Security Research Journal, –Kyev, 2015, Vol 17, No 1, pp. 53-60

Tuychiev G.N. About networks RFWKPES16-8, RFWKPES16-4, RFWKPES16-2 and RFWKPES16-1, created on the basis network PES16-8 // Ukrainian Information Security Research Journal, –Kyev, 2015, Vol 17, No 2, pp. 163-169

Tuychiev G. About networks PES32–8, PES32–4, PES32–2 and PES32–1, created on the basis of network PES32–16 // Ukrainian Scientific Journal of Information Security, –Kyev, 2014, vol. 20, issue 2, pp.164–168

Tuychiev G.N. About networks RFWKPES32–8, RFWKPES32–4, RFWKPES32–2 and RFWKPES32–1, created on the basis of network PES32–16 // Compilation of theses and reports republican seminar «Information security in the sphere communication and information. Problems and their solutions» –Tashkent, 2014.

Tuychiev G. Creating a data encryption algorithm based on network IDEA4-2, with the use the round function of the encryption algorithm GOST 28147-89 // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2014, №4 (32), pp. 49–54

Tuychiev G. Creating a encryption algorithm based on network RFWKIDEA4–2 with the use the round function of the GOST 28147-89 // International Conference on Emerging Trends in Technology, Science and Upcoming Research in Computer Science (ICDAVIM-2015), //printed in International Journal of Advanced Technology in Engineering and Science, 2015, vol. 3, №1, pp. 427-432

Tuychiev G. Creating a encryption algorithm based on network PES4-2 with the use the round function of the GOST 28147-89 // TUIT Bulleten, -Tashkent, 2015, №2(34), pp. 132-136

Tuychiev G. Creating a encryption algorithm based on network RFWKPES4–2 with the use the round function of the GOST 28147–89 // International Journal of Multidisciplinary in Cryptology and Information Security, 2015, vol.4., №2, pp. 14-17

Tuychiev G. The encryption algorithms GOST28147–89–PES8–4 and GOST28147–89–RFWKPES8–4 // «Information Security in the light of the Strategy Kazakhstan-2050»: proceedings III International scientific-practical conference (15-16 October 2015, Astana). - Astana, 2015. pp. 355-371

Tuychiev G. The Encryption Algorithms GOST-IDEA16-2 and GOST-RFWKIDEA16-2 // Global journal of Computer science and technology: E Network, Web & security, vol 16, Issue 1, pp 30-38

Tuychiev G. New encryption algorithm based on network IDEA8-1 using of the transformation of the encryption algorithm AES // IPASJ International Journal of Computer Science, 2015, Volume 3, Issue 1, pp. 1-6

Tuychiev G. New encryption algorithm based on network RFWKIDEA8-1 using transformation of AES encryption algorithm // International Journal of Computer Networks and Communications Security, 2015, Vol. 3, №. 2, pp. 43–47

Tuychiev G. New encryption algorithm based on network PES8-1 using of the transformations of the encryption algorithm AES // International Journal of Multidisciplinary in Cryptology and Information Security, 2015, vol.4., №1, pp. 1-5

Tuychiev G. New encryption algorithm based on network RFWKPES8-1 using of the transformations of the encryption algorithm AES // International Journal of Multidisciplinary in Cryptology and Information Security, 2014, vol.3., №6, pp. 31-34

Tuychiev G. New encryption algorithm based on network IDEA16-1 using of the transformation of the encryption algorithm AES // IPASJ International Journal of Information Technology, 2015, Volume 3, Issue 1, pp. 6-12

Tuychiev G.N. The encryption algorithm AES–RFWKIDEA16–1 // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2015. №2 (34). pp. 48–54.

Tuychiev G. The encryption algorithms AES-PES16-1 and AES-RFWKPES16-1 based on networks PES16-1 and RFWKPES16-1 // International Journal of Electronics and Information Engineering, 2015, Vol.3, No.2, pp.53-66

Tuychiev G. Creating a block encryption algorithm based network IDEA32–1 using transformation of the encryption algorithm AES // Acta NUUz, –Tashkent, 2015, №2/1, pp. 136–142.

Tuychiev G. The encryption algorithm AES-RFWKIDEA32-1 based on network RFWKIDEA32-1 // Global journal of Computer science and technology: E Network, Web & security, vol 15, Issue 4, pp 33-41

Tuychiev G. Creating a block encryption algorithm based networks PES32-1 and RFWKPES32-1 using transformation of the encryption algorithm AES // Compilation scientific work scientific and practical conference «Current issues of cyber security and information security-CICSIS-2015», -Kyev, 25-28 February 2015, pp. 101-112

Tuychiev G. Creating a block encryption algorithm on the basis of networks IDEA32-4 and RFWKIDEA32-4 using transformation of the encryption algorithm AES // Ukrainian Scientific Journal of Information Security, –Kyev, 2015, vol. 21, issue 1, pp. 148–158

Tuychiev G. The encryption algorithms AES–PES16–2 and AES–RFWKPES16–2 // Compilation of theses and reports republican seminar «Information security in the sphere communication and information. Problems and their solutions» –Tashkent, 2015

Vaudenay S. On the Lai–Massey Scheme // ASIACRYPT'99, LNCS 1716, Springer–Verlag, 2000. pp 8–19

Published

2017-03-27

Issue

Section

Articles