Affiliation:
1. Information security laboratory, Institute Information and Computational Technologies , Almaty , Kazakhstan
Abstract
Abstract
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algorithm and all the transformations used in the encryption and decryption processes are described. The process of generating the round keys of the algorithm is also considered. The results of the study of the cryptographic properties of the algorithm using the “avalanche effect” and statistical tests are presented. The avalanche property was tested for each round with each bit of the source text changing. Based on the work carried out, it was found that the proposed encryption algorithm is effective in providing a good avalanche effect, and the binary sequence obtained after encryption is close to random. The research revealed good cryptographic properties of this algorithm.
Subject
Electrical and Electronic Engineering,Mechanical Engineering,Aerospace Engineering,General Materials Science,Civil and Structural Engineering,Environmental Engineering
Reference7 articles.
1. Zhukov AE. Lightweight cryptography. Part 1. Cybersecurity issues, NPO Echelon, Moskow. Vol. 1, 2015. p. 26–43 (in Russian).
2. Zhukov AE. Lightweight cryptography. Part 2. Cybersecurity issues, NPO Echelon, Moskow. Vol. 2, 2015. p. 2–10 (in Russian).
3. Kapalova NA, Haumen A, Suleimenov OT. Lightweight cryptographic information protection systems. Proceedings of the International Scientific-Practical Conference Actual Problems of Information Security in Kazakhstan. Almaty; 2021. p. 48–53 (in Russian).
4. Kazlauskas K, Kazlauskas J. Key-dependent S-box generation in AES block cipher system. Informatica. 2009;20:23–34.
5. Preneel B. Perspectives on lightweight cryptography. Inscript: Shanghai, China; October 2010. p. 20–4.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Higher Order Differential Attack on the Lightweight Block Cipher LBC-3;2024 Tenth International Conference on Communications and Electronics (ICCE);2024-07-31