Preview

Proceedings in Cybernetics

Advanced search

Analysis and comparison of block symmetric encryption algorithms

https://doi.org/10.35266/1999-7604-2024-4-6

Abstract

In modern world, cryptography has become an essential part of the information security. With the constant development of technologies and increasing volumes of transmitted data, the necessity of their reliable protection becomes extremely urgent. This article is devoted to a comparative analysis of modern symmetric encryption algorithms. The comparison criteria are security, complexity, performance, applicability, and standardization.

About the Authors

I. V. Poddubnyy
Surgut State University, Surgut
Russian Federation

Master’s Degree Student



M. Ya. Braginsky
Surgut State University, Surgut
Russian Federation

Doctor of Sciences (Engineering), Docent



References

1. The DES Algorithm Illustrated. URL: https://page.math.tu-berlin.de/~kant/teaching/hess/krypto-ws2006/des.htm (дата обращения: 27.09.2024).

2. Remove the highly insecure DES encryption from the User accounts. URL: https://learn.microsoft.com/en-us/services-hub/unified/health/remediation-steps-ad/remove-the-highly-insecure-des-encryption-from-user-accounts (дата обращения: 27.09.2024).

3. Denning D. E., Dorothy E. Digital signatures with RSA and other public-key cryptosystems. Communications of the ACM. USA : ACM, 1984. p. 388–392.

4. Davio M., Desmedt Y., Fosseprez M. et al. Analytical Characteristics of the DES. Advances in Cryptology. Heidelberg : Springer, 1984. p. 171–202.

5. Konheim A. G. Cryptography, a primer. New York, 1981. 432 p.

6. Miyaguchi S. The FEAL Cipher Family. Advances in Cryptology-CRYPTO’ 90. Heidelberg : Springer, 1990. p. 628–638.

7. Gilbert H., Chasse G. A Statistical Attack of the FEAL-8 Cryptosystem. Advances in Cryptology. Heidelberg : Springer, 1991. p. 22–33.

8. Ko Y., Hong S., Lee W. et al. Related Key Differen- tial Attacks on 27 Rounds of XTEA and Full-Round GOST. Heidelberg : Springer, 2004. P. 299–316.

9. Шнайер Б. Прикладная криптография: протоколы, алгоритмы и исходный код на С. 2-е изд. М. : Диалектика, 2022. 1040 с.

10. DES algorithm. URL: https://github.com/dhuertas/DES/blob/master/des.c (дата обращения: 01.10.2024).

11. feal-8.c. URL: https://github.com/deeptechlabs/encryption/blob/master/FEAL8-WI/feal-8.c (дата обращения: 01.10.2024).


Review

For citations:


Poddubnyy I.V., Braginsky M.Ya. Analysis and comparison of block symmetric encryption algorithms. Proceedings in Cybernetics. 2024;23(4):60–68. (In Russ.) https://doi.org/10.35266/1999-7604-2024-4-6

Views: 102


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1999-7604 (Online)