Analysis and comparison of block symmetric encryption algorithms
https://doi.org/10.35266/1999-7604-2024-4-6
Abstract
In modern world, cryptography has become an essential part of the information security. With the constant development of technologies and increasing volumes of transmitted data, the necessity of their reliable protection becomes extremely urgent. This article is devoted to a comparative analysis of modern symmetric encryption algorithms. The comparison criteria are security, complexity, performance, applicability, and standardization.
About the Authors
I. V. PoddubnyyRussian Federation
Master’s Degree Student
M. Ya. Braginsky
Russian Federation
Doctor of Sciences (Engineering), Docent
References
1. The DES Algorithm Illustrated. URL: https://page.math.tu-berlin.de/~kant/teaching/hess/krypto-ws2006/des.htm (дата обращения: 27.09.2024).
2. Remove the highly insecure DES encryption from the User accounts. URL: https://learn.microsoft.com/en-us/services-hub/unified/health/remediation-steps-ad/remove-the-highly-insecure-des-encryption-from-user-accounts (дата обращения: 27.09.2024).
3. Denning D. E., Dorothy E. Digital signatures with RSA and other public-key cryptosystems. Communications of the ACM. USA : ACM, 1984. p. 388–392.
4. Davio M., Desmedt Y., Fosseprez M. et al. Analytical Characteristics of the DES. Advances in Cryptology. Heidelberg : Springer, 1984. p. 171–202.
5. Konheim A. G. Cryptography, a primer. New York, 1981. 432 p.
6. Miyaguchi S. The FEAL Cipher Family. Advances in Cryptology-CRYPTO’ 90. Heidelberg : Springer, 1990. p. 628–638.
7. Gilbert H., Chasse G. A Statistical Attack of the FEAL-8 Cryptosystem. Advances in Cryptology. Heidelberg : Springer, 1991. p. 22–33.
8. Ko Y., Hong S., Lee W. et al. Related Key Differen- tial Attacks on 27 Rounds of XTEA and Full-Round GOST. Heidelberg : Springer, 2004. P. 299–316.
9. Шнайер Б. Прикладная криптография: протоколы, алгоритмы и исходный код на С. 2-е изд. М. : Диалектика, 2022. 1040 с.
10. DES algorithm. URL: https://github.com/dhuertas/DES/blob/master/des.c (дата обращения: 01.10.2024).
11. feal-8.c. URL: https://github.com/deeptechlabs/encryption/blob/master/FEAL8-WI/feal-8.c (дата обращения: 01.10.2024).
Review
For citations:
Poddubnyy I.V., Braginsky M.Ya. Analysis and comparison of block symmetric encryption algorithms. Proceedings in Cybernetics. 2024;23(4):60–68. (In Russ.) https://doi.org/10.35266/1999-7604-2024-4-6