OVERVIEW OF THE BLOCK ENCRYPTION DEVELOPMENT

2020 ◽  
Vol 69 (1) ◽  
pp. 295-301
Author(s):  
F.R. Gusmanova ◽  
◽  
G.A. Abdulkarimova ◽  

In the conditions of universal Informatization, the problem of information security and information protection has significantly worsened. This work provides an overview of the block encryption development. Block cipher - a kind of symmetric cipher. A feature of the block cipher is the processing of a block of several bytes in one iteration. Block cryptosystems break the message text into separate blocks and then convert these blocks using a key. Basic information related to block encryption is presented, and the main analysis options are shown. The possibility of students' research work on this topic was noted, and the review of international competitions on block ciphers research was performed. A diagram is shown that can be applied in electronics, and a replacement table is generated and painted for programming. In this case, both of these approaches are equivalent, meaning that an encrypted file on a computer is decrypted on an electronic device and vice versa.

Author(s):  
A. T. Zharkimbekov ◽  
A. B. Ospanov ◽  
K. M. Sagindykov ◽  
◽  

This paper examines international and domestic standards used in the study of computer network security. A brief history of standards in the field of information security is presented. The necessity of standards in the field of information protection is determined. The features and requirements of the standards are studied. Definitions and normative documents in the field of information security used in the author’s research work are also given.


Author(s):  
G. Golovko ◽  
V. Pokhodun

This article highlights the ever-increasing need and importance of information protection and data safety in modern reality, presents the possibilities of encrypting data using the tools of cryptography, particularly concentrating on the Modular Multiplication-based Block Cipher. Review of available sources indicated that there are no publically accessible software implementations of the algorithm available at the moment of writing this article. To achieve a goal of creating such an implementation, information has been compiled for creating a comprehensible and adequate mathematical description of the algorithm. Presented the information security system, an application in C # to encrypt files of any extension using the block encryption algorithm MMB


Author(s):  
Sergio Roldán Lombardía ◽  
Fatih Balli ◽  
Subhadeep Banik

AbstractRecently, cryptographic literature has seen new block cipher designs such as , or that aim to be more lightweight than the current standard, i.e., . Even though family of block ciphers were designed two decades ago, they still remain as the de facto encryption standard, with being the most widely deployed variant. In this work, we revisit the combined one-in-all implementation of the family, namely both encryption and decryption of each as a single ASIC circuit. A preliminary version appeared in Africacrypt 2019 by Balli and Banik, where the authors design a byte-serial circuit with such functionality. We improve on their work by reducing the size of the compact circuit to 2268 GE through 1-bit-serial implementation, which achieves 38% reduction in area. We also report stand-alone bit-serial versions of the circuit, targeting only a subset of modes and versions, e.g., and . Our results imply that, in terms of area, and can easily compete with the larger members of recently designed family, e.g., , . Thus, our implementations can be used interchangeably inside authenticated encryption candidates such as , or in place of .


2021 ◽  
Vol 11 (11) ◽  
pp. 4776
Author(s):  
Kyungbae Jang ◽  
Gyeongju Song ◽  
Hyunjun Kim ◽  
Hyeokdong Kwon ◽  
Hyunji Kim ◽  
...  

Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key cryptography can be lowered from n-bit to n2-bit. When applying Grover’s search algorithm to the block cipher that is the target of potential quantum attacks, the target block cipher must be implemented as quantum circuits. Starting with the AES block cipher, a number of works have been conducted to optimize and implement target block ciphers into quantum circuits. Recently, many studies have been published to implement lightweight block ciphers as quantum circuits. In this paper, we present optimal quantum circuit designs of symmetric key cryptography, including PRESENT and GIFT block ciphers. The proposed method optimized PRESENT and GIFT block ciphers by minimizing qubits, quantum gates, and circuit depth. We compare proposed PRESENT and GIFT quantum circuits with other results of lightweight block cipher implementations in quantum circuits. Finally, quantum resources of PRESENT and GIFT block ciphers required for the oracle of the Grover search algorithm were estimated.


2013 ◽  
Vol 457-458 ◽  
pp. 1224-1227
Author(s):  
Jian Feng Hu ◽  
Zhen Dong Mu

Mobile equipment has now become a new platform for information exchange, spend a lot of information exchange, how to effectively protect the mobile platform information security? Research has shown that, EEG signal can be used as identification tool, the user's information protection and good, this paper to protect the information security of mobile devices to research how to use EEG; the EEG signal is feasible for mobile equipment identification.


Author(s):  
Gh Khaleel ◽  
SHERZOD TURAEV ◽  
M.I.M. Tamrin ◽  
Imad F. Al-Shaikhli

The performance and security have central importance of cryptography field. Therefore, theneed to use block ciphers are become very important. This paper presents a new block cipher based on finiteautomata system. The proposed cryptosystem is executed based on parallel computations to reduce thedelay time. Moreover, to achieve high security, we use different machines (variant non-deterministicautomata accepters) as keys for encryption and decryption.


2021 ◽  
Vol 9 (18) ◽  
pp. 77-90
Author(s):  
Ricardo Luna Santos ◽  
Aldo Hernández Luna ◽  
Jacinto Torres Jiménez ◽  
Manuel Cruz Luna

In this research work, the development of an electronic device that allows reading the temperature, heart rate, and location of a person, and send this data by a text message to a smartphone using a mobile network is proposed. The proposed monitoring device uses sensors that help us detect different types of signals which are translated into human language using microcontrollers, electronics, and various types of programming processes to develop functions to obtain data. As a result, the device will send a text message only if the readings return a parameter different from the normal ranges or when the wearer of the device presses a help button. This will send text messages to the phone number linked to a patient or a patient's relative.


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


2017 ◽  
Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

US defence sponsored the DES program in 1974 and released it in 1977. It remained as a well-known and well accepted block cipher until 1998. Thirty-two 4-bit DES S-Boxes are grouped in eight each with four and are put in public domain without any mention of their design methodology. S-Boxes, 4-bit, 8-bit or 32-bit, find a permanent seat in all future block ciphers. In this paper, while looking into the design methodology of DES S-Boxes, we find that S-Boxes have 128 balanced and non-linear Boolean Functions, of which 102 used once, while 13 used twice and 92 of 102 satisfy the Boolean Function-level Strict Avalanche Criterion. All the S-Boxes satisfy the Bit Independence Criterion. Their Differential Cryptanalysis exhibits better results than the Linear Cryptanalysis. However, no S-Boxes satisfy the S-Box-level SAC analyses. It seems that the designer emphasized satisfaction of Boolean-Function-level SAC and S-Box-level BIC and DC, not the S-Box-level LC and SAC.


Sign in / Sign up

Export Citation Format

Share Document