2022
DOI: 10.3390/computation10110198
|View full text |Cite
|
Sign up to set email alerts
|

Development and Study of an Encryption Algorithm

Abstract: A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformation. The difference between the proposed algorithm and the classical scheme is that the F transformation provides the maximum possible dependence of the output vector bits on the input bits and is based on “modulo 2 addition” and a substitution S-box. To assess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…The algorithm uses pre-developed and investigated S-boxes. The findings are described in [21][22][23]. The study of the cryptostrength of the algorithm begins with the cryptanalysis of each transformation separately.…”
Section: Discussionmentioning
confidence: 99%
“…The algorithm uses pre-developed and investigated S-boxes. The findings are described in [21][22][23]. The study of the cryptostrength of the algorithm begins with the cryptanalysis of each transformation separately.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, the result for the cryptanalyst will be better if the number of eights in the table is smaller. If the number of eights is much greater than the second numbers in the table, then it is said that the 4-bit cryptographic S-block is more resistant to linear cryptanalysis [12,31,32].…”
Section: 4 Linear Cryptanalysis Of the Lbc Algorithmmentioning
confidence: 99%
“…Round keys are directly added to the original encryption data to hide the dependency between input and output in a particular round. Therefore, the statistical properties of the key schedule scheme are important for obtaining random ciphertexts in each round [4], [5]. When developing an encryption algorithm, it is impossible to test all combinations of master keys.…”
Section: Introductionmentioning
confidence: 99%