A NOVEL SERPENT ALGORITHM IMPROVEMENT BY THE KEY SCHEDULE INCREASE SECURITY
Main Article Content
Abstract
Block encryption algorithms rely on the two most important features of their complexity and ease of use to support security requirements (confidentiality, data integrity, and non-repudiation) to prevent unauthorized users from entering the system and tampering with centralized data, disrupting it or disclosing it. The data encryption and decryption process is done using the (Serpent) algorithm, which is one of the most important of these operations. AES Algorithm Proposals. In this paper, a new proposal is presented to improve and support the confidentiality of data while adhering to the external structure of the standard algorithm, relying on designing a new approach to the key generation function because the sobriety of block cipher relies on the use of a strong and unique key. Where several functions were used (Gost external structure) with a combination of (Shift <<<), (AES -Key Schedule), (MD5)). The results of the proposed method were examined using statistical measures, yielding good results, and overcoming the weakness of the key generation function of the original algorithm, in addition to enhancing the most important cryptographic features “confusion”, “diffusion” and “increased randomness”.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.
References
[1] Kabilan. K; Saketh. M. and Nagarajan. kk.(2017). Implementation of Serpent Cryptographic Algorithm For Secured Data Transmission. International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS):p.1-6.
[2] Alaa .k. F.; Semaa. H, Gada .A. and Israa. A.(2017). New Approach for Serpent Block Cipher Algorithm Based on Multi Techniques. Iraqi Journal of Information Technology,7(3):1-13.
[3] Tariq .S.; Tanveer .u. and Ghazanfar .F.(2018). Serpent Algorithm: An improvement by 4 ×4 Sbox from finite Chain ring . International Conference on Applied and Engineering Mathematics(ICAEM),
2018(3):32-37.
[4] Saleh, M. Al. and Ashwaq, T.H. (2005). An Improvement of Serpent algorithm.Eng.&Tech.Journal, 6(24):750-765.
[5] Najafi. B.; Sadeghian, B. Zamani. M. Saheb. and Valizadeh, A.(2004). High speed implementation of serpent algorithm. 16th edn ,.ICM: 718-721pp
[6] Intisar ,A. Y.(2019). Proposed A Permutation and Substitution Methods of Serpent Block. Ibn Al Haitham Journal for Pure and Applied Science, 32 (2): 131-144.
[7] Moni . N . and Moti .Y.(1995). Universal One-Way Hash Functions and their Cryptographic Applications. International Business Machines(IBM), 172(1):1-8.
[8] William. S. (2012). Cryptography and Network Security Principles and Practice. 5th edn,. USA: Prentice Hall: 900 pp.
[9] Shweta .M.; Shikha ,M.and Nilesh .K .(2013).Hashing Algorithm: MD5. International Journal for Scientific Research and Development, ,1(9): 2321-0613.
[10] Aso, A.M.(2017). Cluster forming based on spatial information using HMAC in WSN. Tikrit Journal of Pure Science,22(6) :131-139.
[11] Ye .Ta, Kun .Z, Pu .W, Yuming .Z.and Jun .Y.(2018). Add "Salt" MD5 Algorithm's FPGA Implementation. Procedia computer science,131:255-260.
[12] Ross. A.; Eli, B.and Lars. K.(1998). Serpent A proposal for The AdvancedEncryption Standard. National Institute of Standards and Technology (NIST) AES Proposal,174(1-2):1-7.
[13] Ala'a .K. and Abeer .T.(2018) Improve Block Cipher Algorithms to Protect Banking Storage Sensitive Information, University of Technology Department of Computer Science,pp.20-35,2019.
[14] Piotr .B. and Tomasz.C. (2000). Implementation of the Serpent algorithm using altera FPGA devices. journal Public Comments on AES Candidate Algorithms-Round, vol.2,pp.