Requirements for symmetric block encryption algorithms developed for software and hardware implementation

Authors

  • Kairat Sakanuly Sakan Институт информационных и вычислительных технологий КН МОН РК
  • N. A. Kapalova
  • A. Haumen
  • O. T. Suleimenov

DOI:

https://doi.org/10.26577/JMMCS.2021.v112.i4.12

Keywords:

symmetric block algorithm, cryptographic information protection facility, software, hardware-software, and hardware implementation of encryption algorithms, cryptographic primitives

Abstract

The hardware and software cryptographic information protection facility is one of the most important components of comprehensive information security in information and communication systems and computer networks. This article outlines and systematizes the basic requirements for modern cryptographic information protection facilities (CIPFs), and describes the stages of developing a symmetric block encryption algorithm. Based on the basic requirements for CIPFs, criteria for evaluating the developed cryptographic encryption algorithms were determined. The possibilities and necessary limitations of the types of cryptographic transformations (primitives) in the software and hardware implementation of the developed symmetric block encryption algorithm are considered and defined. On the basis of the developed encryption algorithm, SDTB Granit plans to implement a model of a hardware-software complex for off-line (linear) data encryption, taking into account all the listed requirements and characteristics.

The article presents a new version of the "AL01" encryption algorithm, which is guided by the basic requirements for creating symmetric block ciphers.

References

[1] Ivanov M.A., Chugunkov I.V., "Teoriya, primenenie i ocenka kachestva generatorov psevdosluchajnyh posledovatelnostej [Theory, application, and quality assessment of pseudorandom sequence generators]", Moscow, K-OBRAZ (2003), 136, [in Russian].
[2] Babenko L.K., Ischukova E.A., "Sovremennye algoritmy blochnogo shifrovaniya i metody ih analiza [Modern block cipher algorithms and methods for their analysis]", Moscow, Helios ARV (2006), p. 376, [in Russian].
[3] Schneier B., "Applied Cryptography.: Protocols, Algorithms, and Source Code in C". 2-nd ed.; John Wiley & Sons, Inc. (1996): 118.
[4] Ivanov M.A., " Kriptograficheskie metody zashchity informacii v komp'yuternyh sistemah i setyah [Cryptographic methods of information security in computer systems and networks]", Moscow, K-OBRAZ (2001), 368, [in Russian].
[5] Gorbenko I. D., Dolgov V., Oleynikov R. V., Ruzhentsev V. I., Mikhaylenko, M. S., Gorbenko, Y. I., "Razrabotka trebovanij i princip proektirovaniya perspektivnogo simmetrichnogo blochnogo algoritma shifrovaniya [Development of requirements and design principle perspective symmetrical block encryption algorithm]", Izvestiya yuzhnogo federal'nogo universiteta. Tekhnicheskie nauki no. 1, V. 76 (2007), 183-189, [in Russian].
[6] Gorbenko I. D., Dolgov V., Oleynikov R. V., Ruzhentsev V. I., Mikhaylenko, M. S., Gorbenko, Y. I., "Razrabotka trebovaniy i printsip proektirovaniya perspektivnogo simmetrichnogo blochnogo algoritma shifrovaniya [Development of requirements and design principle perspective symmetrical block encryption algorithm]", Izvestiya YUFU. Tekhnicheskie nauki. no. 1. URL: https://cyberleninka.ru/article/n/razrabotka-trebovaniy-i-printsip-proektirovaniya-perspektivnogo-simmetrichnogo-blochnogo-algoritma-shifrovaniya (2007), (3.11.2020), [in Russian].
[7] Apparatnoe shifrovanie dlya PK [Hardware encryption for PC]. Press center Company Active, 2013. URL: https://www.aktiv-company.ru/press-center/publication/2003-04-10.html (23.11.2020), [in Russian].
[8] Znaenko N.S., Kapitanchuk V.V., Petrishchev I.O., Shubovich V.G., "Nekotorye kriterii ocenki kachestva algoritmov shifrovaniya [Some criteria for evaluating the quality of encryption algorithms]", NovaInfo.Ru. Tekhnicheskie nauki no. 59 (2017) URL: https://novainfo.ru/article/11211 (23.11.2020), [in Russian].
[9] AES discussion forum: http://aes.nist.gov.
[10] New European Schemes for Signatures, Integrity, and Encryption NESSIE: URL: http://cryptonessie.org.
[11] Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption. Springer-Verlag, Berlin Heidelberg NewYork, etc. (2004).
[12] NESSIE public report D20. NESSIE Security Report. URL: http://cryptonessie.org.
[13] URL: http://cryptrec.org/ Cryptography Research and Evaluation Committees.
[14] Report on research work "Development of software and firmware for cryptographic protection of information during its transmission and storage in info-communication systems and general-purpose networks", 2018, State registration no. 0118РК01064.
[15] Biyashev R.G., Smolarsh A., Algazy K.T., Khompysh A., "Encryption algorithm "QAMAL NPNS" using non-positional polynomial notations", Journal of Mathematics, Mechanics, and Computer Science, Bulletin of KazNU no. 1 (105), Almaty (2020), 198-207.
[16] Nursulu Kapalova, Ardabek Khompysh, Müslüm Arici, Kunbolat Algazy. A block encryption algorithm based on exponentiation transform // Cogent Engineering. – 2020. – No. 7 (1788292). – P. 1-12 // https://doi.org/10.1080/23311916.2020.1788292.
[17] Kapalova N.A., Haumen A. "Simmetrichnyj blochnyj algoritm shifrovaniya dannyh «VS-2» [BC-2 symmetric block algorithm for data encryption]", Bezopasnye informacionnye tekhnologii». Sbornik trudov Desyatoj mezhdunarodnoj nauch-no-tekhnicheskoj konferencii, Moscow, Bauman MSTU, 2019, 161-166, [in Russian].
[18] Jonathan K., Yehuda L., "Introduction to Modern Cryptography", CRC PRESS, London-New York- Washington, (2007), 160.
[19] Panasenko S.P. "Algoritmy shifrovaniya [Encryption algorithms]", Special reference book, Saint Petersburg, BHV-Petersburg (2009), 576, [in Russian].

Downloads

Published

2021-12-31