Abstract
The purpose of research - studying the possibilities of practical application of the encryption algorithm based on nonpositional polynomial notations using nested Feistel network. In this paper, a mathematical model of non-conventional encryption algorithm with recursive Feistel network and the encryption mode is described.
References
[1] Pohst M., Zassenhaus H., Algorithmic algebraic number theory, Cambridge University Press, New York, 198910.1017/CBO9780511661952Search in Google Scholar
[2] Biyashev R., Nyssanbayeva S., Algorithm for creation a digital signature with error detection and correction, Cybern. Syst. Anal., 2012, 4, 489-49710.1007/s10559-012-9428-5Search in Google Scholar
[3] Feistel H., Cryptography and Computer Privacy, Sci. Am., 1973, 228, 5, 15-2310.1038/scientificamerican0573-15Search in Google Scholar
[4] Bassham L., Burr W., Dworkin M., Foti J., Roback E., Report on the development of the Advanced Encryption Standard (AES), NIST, U.S. Department of Commerce, 2000Search in Google Scholar
[5] Matsui M., Tokita T., MISTY, KASUMI and Camellia cipher algorithm development. Mitsubishi Electr. Ad., 2002, 100, 1-8Search in Google Scholar
[6] Kapalova N., Nyssanbayeva S., Khakimov R., Irreducible polynomials over the field GF (2n), Proceedings of "KAKHAK" scientifictechnical society (Almaty, Kazakhstan), 2013, 1, 17-28Search in Google Scholar
[7] Biyashev R., Nyssanbayeva S., Begimbayeva Ye., Magzom M., Building modified modular cryptographic systems, Int. J. APMAIN, 2015, 9, 103-109Search in Google Scholar
[8] Dworkin M., Recommendation for block cipher modes of operation: methods and techniques, NIST Spec. Publ., 2001, 800-38A10.6028/NIST.SP.800-38aSearch in Google Scholar
[9] Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., Leigh S., et al., A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Spec. Publ., 2001, 800-2210.6028/NIST.SP.800-22Search in Google Scholar
[10] Schneier B., Kelsey J., Unbalanced Feistel networks and block cipher design, Proceedings of the Third International Workshop on Fast Software Encryption (21-23 February 1996, Cambridge, UK), Springer-Verlag, 1996, 121-14410.1007/3-540-60865-6_49Search in Google Scholar
© 2016
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.