The New Block Cipher Design (Tigris Cipher)

Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published. It has been designed with a good coherent structure that is based on solid algebraic and well mathematical opinions. The proposed cipher uses the SPN structure and what is known by the Galois Field GF (2). It is an iterated cipher that has a conservative design which is easily implemented on both hardware and software. It operates with block size of 128-bits and with three variable key lengths of 128-bits, 192-bits and 256bits in addition to sixteen rounds or multiples of four rounds. The proposed cipher works with good invertible operations’ stages and a compact duplicated ciphering key. The Tigris cipher construction strategy includes the adoption of construction a new S-box with high nonlinearity that uses the same routines of the AES-S-box stage but with different modular arithmetic of irreducible polynomial and different affine matrix in addition to the distinct constant vector. The second and the third layers of the proposed model are based on the shifting concept for the confusion and diffusion process with reversible operations. The last layer of the proposed model is the key addition layer that is responsible for the expanding and generating the ciphering key by two directions those of row and column expansion, which are associated with two constant vectors of golden ratio and base nature algorithm as a fixed word to eliminate any weak or semiweak ciphering key.

[1]  Michalis D. Galanis,et al.  64-bit Block ciphers: hardware implementations and comparison analysis , 2004, Comput. Electr. Eng..

[2]  Abdel-Badeeh M. Salem,et al.  Innovative Method for enhancing Key generation and management in the AES-algorithm , 2015, ArXiv.

[3]  Faramarz Fekri,et al.  A block cipher cryptosystem using wavelet transforms over finite fields , 2004, IEEE Transactions on Signal Processing.

[4]  Matthew J. B. Robshaw,et al.  Algebraic aspects of the advanced encryption standard , 2006 .

[5]  Matthew J. B. Robshaw,et al.  Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security) , 2006 .

[6]  Saddaf Rubab,et al.  Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption , 2015 .

[7]  Carlos Cid Some Algebraic Aspects of the Advanced Encryption Standard , 2004, AES Conference.

[8]  Ling-guo Cui,et al.  A NEW S-BOX STRUCTURE NAMED AFFINE-POWER-AFFINE , 2007 .

[9]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[10]  Ross Anderson,et al.  Serpent: A Proposal for the Advanced Encryption Standard , 1998 .

[11]  Mahamod Ismail,et al.  Enhancement of AES algorithm based on chaotic maps and shift operation for image encryption , 2015 .

[12]  Bo Sun,et al.  Performance Analysis of Advanced Encryption Standard (AES). , 2006 .

[13]  Jong-Nam Kim,et al.  Symmetry structured SPN block cipher algorithm , 2009, 2009 11th International Conference on Advanced Communication Technology.

[14]  Md. Nazrul Islam,et al.  Effect of Security Increment to Symmetric Data Encryption through AES Methodology , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[15]  Omar A. Dawood,et al.  Proposing of Developed Advance Encryption Standard , 2011, 2011 Developments in E-systems Engineering.

[16]  M. Girault,et al.  The Feasibility of Onthe-Tag Public Key Cryptography , 2007 .

[17]  M. Ram Murty,et al.  Problems in algebraic number theory , 1998 .

[18]  John M. Howie,et al.  Fields and Galois Theory , 2006 .

[19]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .