Secure and efficient symmetric-key encryption algorithm

Ahmed Mahmoud Salama Rayan;

Abstract


In 1997, a competition to choose a symmetric-key encryption algorithm instead of Data Encryption Standard algorithm (DES) was started by the National Institute of Standards and Technology (NIST). NIST specified the evaluation criteria for chosen the candidate algorithms relying on the analyses and comments received. These criteria are divided into two main categories:
i. Algorithm security.
ii. Algorithm implementation features.
Algorithm security was the main significant criteria, it includes characteristics as: algorithm strength to attacks, its mathematical foundation and the output randomness.
Finally, NIST selected five finalist algorithms (Rijndael, Serpent, RC6, MARS and Twofish). Then, NIST chose Rijndael to be the suggested Advanced Encryption Standard algorithm (AES).
Twofish algorithm, one of the last five candidate algorithms has a large security margin but also has some drawbacks as its structure is hard to analyses, the mingling of many processes makes it not easy to produce a fair analysis and imposes to searching for approximation mechanisms. Moreover, the use of key-dependent S-boxes increases the complexity and the effort needed to estimate the characteristics (differentials, linear …) of the structure.
In this thesis a proposal of a provably Secure Symmetric-key Encryption (SSE) algorithm based on Feistel structure is presented to overcome the previous drawbacks. A 16-round reversible Basic Feistel Network (BFN) is presented, besides construct a novel key schedule. It supports 128-bit and 256-bit symmetric key block cipher with 128-bit key size; its key size can be extended to 256 bits.


Other data

Title Secure and efficient symmetric-key encryption algorithm
Other Titles تصميم خوارزم تشفير متناظر اَمن وفعال
Authors Ahmed Mahmoud Salama Rayan
Issue Date 2017

Attached Files

File SizeFormat
J2235.pdf619.66 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 2 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.