The encryption algorithms GOST28147–89–IDEA8–4 and GOST28147–89–RFWKIDEA8–4
DOI:
https://doi.org/10.18372/2410-7840.19.11199Keywords:
Lai–Massey scheme, round function, round keys, output transformation, multiplication, addition, S–boxAbstract
In this paper there were created new encryption algorithms GOST28147–89–IDEA8–4 and GOST28147–89–RFWKIDEA8–4 based on networks IDEA8–4 and RFWKIDEA8–4, with the use the round function of the encryption algorithm GOST 28147–89. The block length of encryption algorithm is 256 bits, the number of rounds is 8, 12, 16 and length of the key switches from 256 to 1024 bits. Depending on information privacy and encryption speed can we choose the number of rounds and key length. In the encryption algorithms encryption and decryption use the same algorithm, only when decryption calculates the inverse of round keys depending on operations and they are applied in reverse order.References
Aripov M., Tuychiev G. The network IDEA4–2, consists from two round functions // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2012, №4 (24), pp. 55–59.
Aripov M., Tuychiev G. The network PES8–4, consists from four round functions // Materials of the international scientific conference конференции «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2012», Volume № II, –Tashkent, 2012, pp. 16–19.
Aripov M., Tuychiev G. Development block encryption algorithm based networks IDEA16–2 and RFWKIDEA16–2 using the transformation of encryption algorithm AES // «Information Security in the light of the Strategy Kazakhstan-2050»: proceedings III International scientific-practical conference (15-16 October 2015, Astana). - Astana, 2015. pp. 40-60
Aripov M., Tuychiev G. The encryption algorithm AES–PES32–4 based on network PES32–4 // Transactions of the international scientific conference «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2016», Volume № 2, –Buchara, 2016, pp. 28–34
Aripov M., Tuychiev G. The Encryption Algorithm AES-RFWKPES32-4 // International Journal of Electronics and Information Engineering, Vol.5, No.1, -pp.20-29
Bakhtiyorov U., Tuychiev G. About Generation Resistance S-Box And Boolean Function On The Basis Of Nyberg Construction // Materials scientific-technical conference «Applied mathematics and information security», Tashkent, 2014, 28–30 april, -pp. 317–324
Daeman J., Rijmen V. AES Proposal: Rijndael // NIST AES Proposal, http://csrc.nist.gov/. 1998
GOST 28147–89. National Standard of the USSR. Information processing systems. Cryptographic protection. Algorithm cryptographic transformation
Lai X., Massey J. On the design and security of block cipher. ETH series in information processing, v.1. 1992
Tuychiev G. The networks RFWKIDEA4–2, IDEA4–1 and RFWKIDEA4–1 // Acta of Turin polytechnic university in Tashkent, 2013, №3, pp. 71-77
Tuychiev G.N. The network IDEA8–4, consists from four round functions // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2013, №2 (26), pp. 55–59.
Tuychiev G. About networks IDEA8–2, IDEA8–1 and RFWKIDEA8–4, RFWKIDEA8–2, RFWKIDEA8–1 developed on the basis of network IDEA8–4 // Uzbek mathematical journal, –Tashkent, 2014, №3, pp. 104–118
Tuychiev G. About networks IDEA16–4, IDEA16–2, IDEA16–1, created on the basis of network IDEA16–8 // Compilation of theses and reports republican seminar «Information security in the sphere communication and information. Problems and their solutions» –Tashkent, 2014
Tuychiev G. About networks RFWKIDEA16–8, RFWKIDEA16–4, RFWKIDEA16–2, RFWKIDEA16–1, created on the basis network IDEA16–8 // Ukrainian Scientific Journal of Information Security, –Kyev, 2014, vol. 20, issue 3, pp. 259–263
Tuychiev G. About networks IDEA32–8, IDEA32–4, IDEA32–2, IDEA32–1, created on the basis of network IDEA32–16 // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2014. №2 (30), pp. 45–50.
Tuychiev G. To the networks RFWKIDEA32–16, RFWKIDEA32–8, RFWKIDEA32–4, RFWKIDEA32–2 and RFWKIDEA32–1, based on the network IDEA32–16 // International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 1, March 2015, pp. 9-20
Tuychiev G. The network PES4–2, consists from two round functions // Uzbek journal of the problems of informatics and energetics. –Tashkent, 2013, №5–6, pp. 107–111
Tuychiev G. About networks PES4–1 and RFWKPES4–2, RFWKPES4–1 developed on the basis of network PES4–2 // Uzbek journal of the problems of informatics and energetics. –Tashkent, 2015, №1-2, pp. 100-105.
Tuychiev G.N. About networks PES8–2 and PES8–1, developed on the basis of network PES8–4 // Transactions of the international scientific conference «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2012», Volume № II, – Samarkand, 2014, pp. 28–32.
Tuychiev G.N. About networks RFWKPES8–4, RFWKPES8–2, RFWKPES8–1, developed on the basis of network PES8–4 // Transactions of the international scientific conference «Modern problems of applied mathematics and information technologies–Al–Khorezmiy 2012», Volume № 2, –Samarkand, 2014, pp. 32–36
Tuychiev G.N. About networks PES16–4, PES16–2 and PES16–1, created on the basis network PES16–8 // Ukrainian Information Security Research Journal, –Kyev, 2015, Vol 17, No 1, pp. 53-60
Tuychiev G.N. About networks RFWKPES16-8, RFWKPES16-4, RFWKPES16-2 and RFWKPES16-1, created on the basis network PES16-8 // Ukrainian Information Security Research Journal, –Kyev, 2015, Vol 17, No 2, pp. 163-169
Tuychiev G. About networks PES32–8, PES32–4, PES32–2 and PES32–1, created on the basis of network PES32–16 // Ukrainian Scientific Journal of Information Security, –Kyev, 2014, vol. 20, issue 2, pp.164–168
Tuychiev G.N. About networks RFWKPES32–8, RFWKPES32–4, RFWKPES32–2 and RFWKPES32–1, created on the basis of network PES32–16 // Compilation of theses and reports republican seminar «Information security in the sphere communication and information. Problems and their solutions» –Tashkent, 2014.
Tuychiev G. Creating a data encryption algorithm based on network IDEA4-2, with the use the round function of the encryption algorithm GOST 28147-89 // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2014, №4 (32), pp. 49–54
Tuychiev G. Creating a encryption algorithm based on network RFWKIDEA4–2 with the use the round function of the GOST 28147-89 // International Conference on Emerging Trends in Technology, Science and Upcoming Research in Computer Science (ICDAVIM-2015), //printed in International Journal of Advanced Technology in Engineering and Science, 2015, vol. 3, №1, pp. 427-432
Tuychiev G. Creating a encryption algorithm based on network PES4-2 with the use the round function of the GOST 28147-89 // TUIT Bulleten, -Tashkent, 2015, №2(34), pp. 132-136
Tuychiev G. Creating a encryption algorithm based on network RFWKPES4–2 with the use the round function of the GOST 28147–89 // International Journal of Multidisciplinary in Cryptology and Information Security, 2015, vol.4., №2, pp. 14-17
Tuychiev G. The encryption algorithms GOST28147–89–PES8–4 and GOST28147–89–RFWKPES8–4 // «Information Security in the light of the Strategy Kazakhstan-2050»: proceedings III International scientific-practical conference (15-16 October 2015, Astana). - Astana, 2015. pp. 355-371
Tuychiev G. The Encryption Algorithms GOST-IDEA16-2 and GOST-RFWKIDEA16-2 // Global journal of Computer science and technology: E Network, Web & security, vol 16, Issue 1, pp 30-38
Tuychiev G. New encryption algorithm based on network IDEA8-1 using of the transformation of the encryption algorithm AES // IPASJ International Journal of Computer Science, 2015, Volume 3, Issue 1, pp. 1-6
Tuychiev G. New encryption algorithm based on network RFWKIDEA8-1 using transformation of AES encryption algorithm // International Journal of Computer Networks and Communications Security, 2015, Vol. 3, №. 2, pp. 43–47
Tuychiev G. New encryption algorithm based on network PES8-1 using of the transformations of the encryption algorithm AES // International Journal of Multidisciplinary in Cryptology and Information Security, 2015, vol.4., №1, pp. 1-5
Tuychiev G. New encryption algorithm based on network RFWKPES8-1 using of the transformations of the encryption algorithm AES // International Journal of Multidisciplinary in Cryptology and Information Security, 2014, vol.3., №6, pp. 31-34
Tuychiev G. New encryption algorithm based on network IDEA16-1 using of the transformation of the encryption algorithm AES // IPASJ International Journal of Information Technology, 2015, Volume 3, Issue 1, pp. 6-12
Tuychiev G.N. The encryption algorithm AES–RFWKIDEA16–1 // Infocommunications: Networks–Technologies–Solutions. –Tashkent, 2015. №2 (34). pp. 48–54.
Tuychiev G. The encryption algorithms AES-PES16-1 and AES-RFWKPES16-1 based on networks PES16-1 and RFWKPES16-1 // International Journal of Electronics and Information Engineering, 2015, Vol.3, No.2, pp.53-66
Tuychiev G. Creating a block encryption algorithm based network IDEA32–1 using transformation of the encryption algorithm AES // Acta NUUz, –Tashkent, 2015, №2/1, pp. 136–142.
Tuychiev G. The encryption algorithm AES-RFWKIDEA32-1 based on network RFWKIDEA32-1 // Global journal of Computer science and technology: E Network, Web & security, vol 15, Issue 4, pp 33-41
Tuychiev G. Creating a block encryption algorithm based networks PES32-1 and RFWKPES32-1 using transformation of the encryption algorithm AES // Compilation scientific work scientific and practical conference «Current issues of cyber security and information security-CICSIS-2015», -Kyev, 25-28 February 2015, pp. 101-112
Tuychiev G. Creating a block encryption algorithm on the basis of networks IDEA32-4 and RFWKIDEA32-4 using transformation of the encryption algorithm AES // Ukrainian Scientific Journal of Information Security, –Kyev, 2015, vol. 21, issue 1, pp. 148–158
Tuychiev G. The encryption algorithms AES–PES16–2 and AES–RFWKPES16–2 // Compilation of theses and reports republican seminar «Information security in the sphere communication and information. Problems and their solutions» –Tashkent, 2015
Vaudenay S. On the Lai–Massey Scheme // ASIACRYPT'99, LNCS 1716, Springer–Verlag, 2000. pp 8–19
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).