H. Elkamchouchi, F. Ahmed, A. A. Elsoud, Dalia H. Elkamchouchi
{"title":"New Symmetric Cipher Enhanced by Rotor in Real & Gaussian Domains (SCER)","authors":"H. Elkamchouchi, F. Ahmed, A. A. Elsoud, Dalia H. Elkamchouchi","doi":"10.1109/ICFN.2010.86","DOIUrl":null,"url":null,"abstract":"This paper gives a new symmetric cryptosystem using twelve rounds enhanced by sixteen wheels rotor operating on all the 256 characters indicated by the ASCII. It uses thirty-two bits S-boxes implemented using thirty-two bits affine transformation modulo 232 addition and thirty-two bits XORING are used followed by modulo 232+1 multiplication. Numerical results are used to implement the proposed cryptosystem. The strength of this system is compared with the well known DES and IDEA symmetric systems and gives excellent results from the point of view of the security characteristics and the statistics of the ciphertext.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Future Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFN.2010.86","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper gives a new symmetric cryptosystem using twelve rounds enhanced by sixteen wheels rotor operating on all the 256 characters indicated by the ASCII. It uses thirty-two bits S-boxes implemented using thirty-two bits affine transformation modulo 232 addition and thirty-two bits XORING are used followed by modulo 232+1 multiplication. Numerical results are used to implement the proposed cryptosystem. The strength of this system is compared with the well known DES and IDEA symmetric systems and gives excellent results from the point of view of the security characteristics and the statistics of the ciphertext.