2020
DOI: 10.1080/23311916.2020.1788292
|View full text |Cite
|
Sign up to set email alerts
|

A block encryption algorithm based on exponentiation transform

Abstract: This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining. The paper also considers an optimization technique to advance the efficiency of key selection and calculation. We discuss the possibility to obtain good results by applying the peculiar properties of cryptographic primitives in the Galois field. To increase the strength and speed of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
1
0
1
Order By: Relevance
“…From the obtained results, we can conclude that the ISL-LWC algorithm satisfies the statistical security criteria. statistic is compared with the tabular results and, depending on the probability of occurrence of such a statistic, a conclusion is made about its quality [23]. Among the advantages of these tests are their small number and the existence of fast execution algorithms.…”
Section: ) Nist Statistical Testsmentioning
confidence: 99%
“…From the obtained results, we can conclude that the ISL-LWC algorithm satisfies the statistical security criteria. statistic is compared with the tabular results and, depending on the probability of occurrence of such a statistic, a conclusion is made about its quality [23]. Among the advantages of these tests are their small number and the existence of fast execution algorithms.…”
Section: ) Nist Statistical Testsmentioning
confidence: 99%
“…In [12], EDS module algorithms for block data encryption (based on exponentiation transform) were considered, as well as in [13], the development using NPNS was considered. In [12,13], only software implementations of encryption and its testing with various test data are presented. As known, cryptosystems based on NPNS can be implemented in software, hardware-software and hardware.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Найбільш відомими та більш криптостійкими алгоритмами симетричних шифрів є: AES (Advanced Encryption Standard) та DES (Data Encryption Standard) -стандарти шифрування США [2]; IDEA (International Data Encryption Algorithm) -інтернаціональний; SEAL (Software Efficient Algorithm) -ефективний програмний; WAKE (World Auto Key Algorithm) -всесвітній алгоритм шифрування на автоматичному ключі [3]; ГОСТ 28147-89 -російський стандарт [4].…”
Section: аналіз наукових публікаційunclassified