Abdumannon Kodirjonovich Jumakulov
Lecturer, Kokand branch of Tashkent state technical university
DOI : https://doi.org/10.47191/ijmra/v5-i5-14Google Scholar Download Pdf
ABSTRACT:
The article presents the EPES8–2 network with two round functions using the same algorithm for encryption and decryption.
INTRODUCTION:Currently, block encryption algorithms based on the Feystel network are widely used. Block encryption algorithms based on the Feystel network include encryption algorithms such as DES, GOST 28147-89, as well as block encryption algorithms such as CAST 256, DFC, E2, LOKI97, which participated in the competition announced by NIST. The advantage of this network is that a single algorithm is used for encryption and decryption, only the encryption round keys are used in reverse order for decryption.
KEYWORDS:Feystel network, Lai-Massey scheme, encryption, decryption, round keys, round functions.
REFERENCES
1) Aripov M.M., Tuychiev G.N. PES8–4 network consisting of four rounds of functions // Proceedings of the International
Scientific Conference "Actual Problems of Applied Mathematics and Information Technology - Al-Khwarizmi 2012",
collection № II. - Tashkent. 2012, 16–19 p.
2) Tuychiev G.N. PES4–2 network consisting of two rounds of functions // Journal of Informatics and Energy Problems
journal of Uzbekistan, –Tashkent, 2013. №5–6, 107–111 p. (05.00.00, №5).
3) Tuychiev G.N. About PES4–1, RFWKPES4–2, PES4–1 networks created on the basis of PES4–2 network // Informatics
and Energy Problems jounal of Uzbekistan. – Tashkent, 2015. №1–2, 100–105 p. (05.00.00, №5).
4) Tuychiev G.N. About RFWKPES8–4, RFWKPES8–2, RFWKPES8–1 networks created on the basis of PES8–4 network //
Collection of reports of the international conference “Actual problems of applied mathematics and information
technologies – Al-Khwarizmi 2014”, collection № 2, –Samarkand. 2014, 32–36 p.
5) Tuychiev G.N. About RFWKPES32–16, RFWKPES32–8, RFWKPES32–4, RFWKPES32–2 and RFWKPES32–1 networks
created on the basis of PES32–16 network // “Information security in the field of communication and information.
Problems and ways to solve them”, Republican seminar collection of reports and abstracts. – Tashkent, 2014.
6) Tuychiev G.N. On the PES2m–m network consisting of m round functions and its modification // Security of
Information. –Kyiv, 2015. Volume 21. No. 1. 52–63 p.
7) Lai X., Massey J.L. A proposal for a new block encryption standard. Advances in Cryptology - Proc. Eurocrypt’90, LNCS
473, Springer – Verlag, 1991, 389–404 p.
8) Lai X., Massey J.L. On the design and security of block cipher. ETH series in information processing, v.1, Konstanz:
Hartung–Gorre Verlag, 1992.
9) Junod, P., Vaudenay, S.. FOX: a new family of block ciphers. In 11th Selected Areas in Cryptography (SAC) Workshop,
LNCS 3357, pages 114–129. Springer–Verlag.
10) Akbarov D.E., Umarov Sh.A. Working out the new algorithm enciphered the data with a symmetric key. //Siberian
Federal University. Engineering & Technologies. 2016, 9(2), 214-224 p, DOI: 10.17516/1999-494x-2016-9-2-214-224.
11) Akbarov D., Umarov Sh. Mathematical characteristics of application of mathematical characteristics of logical
operations and table substitution in cryptographic transformations. //Scientific-technical journal: 2021, V.4, №2 pp 6-
14.
12) Abdurakhmonova, M. M., ugli Mirzayev, M. A., Karimov, U. U., & Karimova, G. Y. (2021). Information Culture And
Ethical Education In The Globalization Century. The American Journal of Social Science and Education Innovations, 3(03),
384-388.
13) Akbarov D. E. Umarov Sh. A.(2020). Applying Logical Operations and table replacements in modeling basic
transformations of Symmetric block encryption algorithms //International Journal of Mechanical and Production
Engineering Research and Development. – Т. 10. – №. 3. – С. 15041-15046.
Volume 05 Issue 05 MAY 2022
There is an Open Access article, distributed under the term of the Creative Commons Attribution – Non Commercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting and building upon the work for non-commercial use, provided the original work is properly cited.
Our Services and Policies
Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected.
The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal.
International Journal of Multidisciplinary Research and Analysis will publish 12 monthly online issues per year,IJMRA publishes articles as soon as the final copy-edited version is approved. IJMRA publishes articles and review papers of all subjects area.
Open access is a mechanism by which research outputs are distributed online, Hybrid open access journals, contain a mixture of open access articles and closed access articles.
International Journal of Multidisciplinary Research and Analysis initiate a call for research paper for Volume 07 Issue 12 (December 2024).
PUBLICATION DATES:
1) Last Date of Submission : 26 December 2024 .
2) Article published within a week.
3) Submit Article : editor@ijmra.in or Online
Why with us
1 : IJMRA only accepts original and high quality research and technical papers.
2 : Paper will publish immediately in current issue after registration.
3 : Authors can download their full papers at any time with digital certificate.
The Editors reserve the right to reject papers without sending them out for review.
Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected. The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal.