ANALYSIS AND SOFTWARE IMPLEMENTATION OF MODULAR MULTIPLICATION-BASED BLOCK CIPHER
DOI:
https://doi.org/10.26906/SUNZ.2021.3.078Keywords:
MMB, information protection, information security, cryptography, complex methods of information protection, encryptionAbstract
This article highlights the ever-increasing need and importance of information protection and data safety in modern reality, presents the possibilities of encrypting data using the tools of cryptography, particularly concentrating on the Modular Multiplication-based Block Cipher. Review of available sources indicated that there are no publically accessible software implementations of the algorithm available at the moment of writing this article. To achieve a goal of creating such an implementation, information has been compiled for creating a comprehensible and adequate mathematical description of the algorithm. Presented the information security system, an application in C # to encrypt files of any extension using the block encryption algorithm MMBDownloads
References
A. Joux, Algorithmic Crypanalysis, United States: CRC Press, 2009.
Daemen, J., Van Linden, L., Govaerts, R., Vandewalle, J.: Propagation Properties of Multiplication Modulo 2n − 1. In: Proceedings of the 13th Symposium on Information Theory in the Benelux, Werkgemeenschap voor informatieen Communicatietheorie, Enschede, The Netherlands, pp. 111–118 (1992)
Wang M., Nakahara J., Sun Y. (2009) Cryptanalysis of the Full MMB Block Cipher. In: Jacobson M.J., Rijmen V., Safavi-Naini R. (eds) Selected Areas in Cryptography. SAC 2009. Lecture Notes in Computer Science, vol 5867. Springer, Berlin, Heidelberg.
Bruce Schneier. Applied Cryptography (2nd Ed.): Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., USA, 1995.
Daemen, J., Govaerts, R., Vandewalle, J.: Block Ciphers Basedon Modular Multiplication. In: Wolfowicz, W. (ed.) Proceedings of 3rd Symposium on State and Progress of Research in Cryptography, Fondazione Ugo Bordoni, pp. 80–89 (1993).
Lai, X.: On the Design and Security of Block Ciphers. In: Massey, J.L. (ed.) ETH Series in Information Processing, vol. 1. Hartung-Gorre Verlag, Konstanz (1995)
Daemen, J.: Cipher and Hash Function Design – Strategies based on Linear and Differential Cryptanalysis. PhD Thesis, Dept. Elektrotechniek, Katholieke Universiteit Leuven, Belgium (1995)