New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher

In this paper, we have proposed a new iterated symmetric cipher, which is designed with Substitution and Permutation Network (SPN) structure and depends on strong mathematical built. It uses a compact algorithm for encryption and decryption processes, which consists of four main stages that roughly similar in its work to the Advance Encryption Standard (AES) stages. Starting by the SubByte operation, ReversibleShiftrows operation, ReversibleMixcolumns operation, and Round key addition. The proposed operations in this cipher have implemented in a straightforward manner relatively in both Encryption/Decryption by an elegant way. These four stages designed to reduce the hardware requirements and to produces high efficiency, which keeps the encryption and decryption process at the same speed in the hardware devices and eliminates the difference of execution times as well as creates a balance in forward and backward operations. The proposed cipher interested with modern design by adopted new algebraic operations and clear mathematical notations to ensure a high level of security. The proposed cipher did not build suddenly or arbitrarily but it acts as a sequence of developments and represents as a long process of design for long time, since several proposed ciphers have been published recently by us that paved the way to its new design, so the designed cipher inherited a good properties from a proven famous algorithms’ features to produce high resistance against all known attacks and to submit a high performance on many platforms and in a wide range of hardware and software applications.

[1]  Pantelimon Stanica,et al.  Cryptographic Boolean Functions and Applications , 2009 .

[2]  Angelos D. Keromytis,et al.  Elastic block ciphers: method, security and instantiations , 2009, International Journal of Information Security.

[3]  Howard M. Heys,et al.  FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks , 2013, Mob. Networks Appl..

[4]  Antoine Joux,et al.  Report on the AES Candidates , 1999 .

[5]  Palash Sarkar Tweakable enciphering schemes using only the encryption function of a block cipher , 2011, Inf. Process. Lett..

[6]  Khoongming Khoo,et al.  Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure , 2009, ACISP.

[7]  Xinmiao Zhang,et al.  Wireless Security and Cryptography: Specifications and Implementations , 2007 .

[8]  Omar A. Dawood,et al.  The New Block Cipher Design (Tigris Cipher) , 2015 .

[9]  Andrey Bogdanov,et al.  On unbalanced Feistel networks with contracting MDS diffusion , 2011, Des. Codes Cryptogr..

[10]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[11]  Siddhartha Bhattacharyya,et al.  A study and analysis on symmetric cryptography , 2014, 2014 International Conference on Science Engineering and Management Research (ICSEMR).

[12]  Svenja Huntemann,et al.  The upper bound of general Maximum Distance Separable codes , 2012 .

[13]  Bac Do Thi,et al.  An Effective and Secure Cipher Based on SDDO , 2012 .