A NOVEL SERPENT ALGORITHM IMPROVEMENT BY THE KEY SCHEDULE INCREASE SECURITY

Main Article Content

Hassan Rahmah Zagi
Abeer Tariq Maolood

Abstract

Block encryption algorithms rely on the two most important features of their complexity and ease of use to support security requirements (confidentiality, data integrity, and non-repudiation) to prevent unauthorized users from entering the system and tampering with centralized data, disrupting it or disclosing it. The data encryption and decryption process is done using the (Serpent) algorithm, which is one of the most important of these operations. AES Algorithm Proposals. In this paper, a new proposal is presented to improve and support the confidentiality of data while adhering to the external structure of the standard algorithm, relying on designing a new approach to the key generation function because the sobriety of block cipher relies on the use of a strong and unique key. Where several functions were used (Gost external structure) with a combination of (Shift <<<), (AES -Key Schedule), (MD5)). The results of the proposed method were examined using statistical measures, yielding good results, and overcoming the weakness of the key generation function of the original algorithm, in addition to enhancing the most important cryptographic features “confusion”, “diffusion” and “increased randomness”.

Article Details

How to Cite
Hassan Rahmah Zagi, & Abeer Tariq Maolood. (2020). A NOVEL SERPENT ALGORITHM IMPROVEMENT BY THE KEY SCHEDULE INCREASE SECURITY. Tikrit Journal of Pure Science, 25(6), 114–125. https://doi.org/10.25130/tjps.v25i6.320
Section
Articles

References

[1] Kabilan. K; Saketh. M. and Nagarajan. kk.(2017). Implementation of Serpent Cryptographic Algorithm For Secured Data Transmission. International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS):p.1-6.

[2] Alaa .k. F.; Semaa. H, Gada .A. and Israa. A.(2017). New Approach for Serpent Block Cipher Algorithm Based on Multi Techniques. Iraqi Journal of Information Technology,7(3):1-13.

[3] Tariq .S.; Tanveer .u. and Ghazanfar .F.(2018). Serpent Algorithm: An improvement by 4 ×4 Sbox from finite Chain ring . International Conference on Applied and Engineering Mathematics(ICAEM),

2018(3):32-37.

[4] Saleh, M. Al. and Ashwaq, T.H. (2005). An Improvement of Serpent algorithm.Eng.&Tech.Journal, 6(24):750-765.

[5] Najafi. B.; Sadeghian, B. Zamani. M. Saheb. and Valizadeh, A.(2004). High speed implementation of serpent algorithm. 16th edn ,.ICM: 718-721pp

[6] Intisar ,A. Y.(2019). Proposed A Permutation and Substitution Methods of Serpent Block. Ibn Al Haitham Journal for Pure and Applied Science, 32 (2): 131-144.

[7] Moni . N . and Moti .Y.(1995). Universal One-Way Hash Functions and their Cryptographic Applications. International Business Machines(IBM), 172(1):1-8.

[8] William. S. (2012). Cryptography and Network Security Principles and Practice. 5th edn,. USA: Prentice Hall: 900 pp.

[9] Shweta .M.; Shikha ,M.and Nilesh .K .(2013).Hashing Algorithm: MD5. International Journal for Scientific Research and Development, ,1(9): 2321-0613.

[10] Aso, A.M.(2017). Cluster forming based on spatial information using HMAC in WSN. Tikrit Journal of Pure Science,22(6) :131-139.

[11] Ye .Ta, Kun .Z, Pu .W, Yuming .Z.and Jun .Y.(2018). Add "Salt" MD5 Algorithm's FPGA Implementation. Procedia computer science,131:255-260.

[12] Ross. A.; Eli, B.and Lars. K.(1998). Serpent A proposal for The AdvancedEncryption Standard. National Institute of Standards and Technology (NIST) AES Proposal,174(1-2):1-7.

[13] Ala'a .K. and Abeer .T.(2018) Improve Block Cipher Algorithms to Protect Banking Storage Sensitive Information, University of Technology Department of Computer Science,pp.20-35,2019.

[14] Piotr .B. and Tomasz.C. (2000). Implementation of the Serpent algorithm using altera FPGA devices. journal Public Comments on AES Candidate Algorithms-Round, vol.2,pp.