DEVELOPMENT OF SYMMETRICAL BLOCK CIPHER ALGORITHM BASED ON THE FEISTEL NETWORK BY CRYPTOCURRENCY BASIC TABLE TRANSFORMATIONS
Keywords:
encryption; algorithm; Feistel networks; table substitution; algorithm strength; concitination; round keyAbstract
The article examines the issues of research and creation of a symmetric block encryption algorithm based on the Feistel network using cryptographically stable table basic transformations. Such block encryption algorithms are effective in developing software and hardware for information communication networks.
References
Шнайер, Б. (2002). Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. М.: Триумф, 816(3).
Алферов, А. П., Зубов, А. Ю., Кузьмин, А. С., & Черемушкин, А. В. (2001). Основы криптографии. М.: Гелиос арв, 200, 480.
Акбаров, Д. Е. (2009). Ахборот хавфсизлигини таъминлашнинг криптографик усуллари ва уларнинг қўлланилиши. Ўзбекистон маркаси, 432.
Akbarov, D., & Abdukadirov, A. (2022, June). Research of general mathematical characteristics of logical operations and table replacements in cryptographic transformations. In AIP Conference Proceedings (Vol. 2432, No. 1). AIP Publishing.
Зензин, О. С., & Иванов, М. А. (2002). Стандарт криптографической защиты ХХІ века–AES. Теория конечных полей/Под ред. МА Иванова. М.: КУДИЦ-ОБРАЗ, 2002.–340 с.
Akbarov, D. E., Kushmatov, O. E., Umarov, S. A., Bozarov, B. I., & Abduolimova, M. Q. (2021). Research on General Mathematical Characteristics of Boolean Functions’ Models and their Logical Operations and Table Replacement in Cryptographic Transformations. Central asian journal of mathematical theory and computer sciences, 2(11), 36-43.
Umarov, S. A., & Akbarov, D. E. (2016). Working out the new algorithm enciphered the data with a symmetric key. Journal of Siberian Federal University. Engineering & Technologies, 9(2), 214.
Bakhtiyor, A., & Shuxratjon, U. (2016). View of Models of Multiple Valuable Boolean Functions as Well as Implementation in Cryptographic Reflections. In Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (pp. 91-95). International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE).
Akbarov, D. E., & Umarov, S. A. (2016). Новый алгоритм блочного шифрования данных с симметричным ключом. Вісник Київського політехнічного інституту. Серія Приладобудування, (52 (2)), 82-91.
Акбаров, Д. Е., & Умаров, Ш. А. ДОСТАТОЧНОЕ УСЛОВИЕ НЕЛИНЕЙНОСТИ И БУЛЕВЫЕ ФУНКЦИИ ЛОГИЧЕСКИХ ТАБЛИЧНЫХ ПРЕОБРАЗОВАНИЙ. ЖУРНАЛИ, 19.
Фомичёв, В. (2023). Криптографические методы защиты информации. Курс лекций. Litres.
Additional Files
Published
How to Cite
License
Copyright (c) 2024 Shukhrat Umarov, Davlatali Akbarov, Ummatali Akbarov, Mavzurjon Kuchkorov

This work is licensed under a Creative Commons Attribution 4.0 International License.