<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>National Aviation University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine s.gnatyuk@nau.edu.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>v.kinzeryavyy@nau.edu.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>odarchenko.r.s@ukr.net</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Scientific Cyber Security Association</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tbilisi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Georgia m.iavich@scsa.ge</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Almaty University of Power Engineering and Telecommunications</institution>
          ,
          <addr-line>Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kyiv College of Communication</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Today cryptographic methods use to provide confidentiality and integrity of the data. In other hand, there are many threats related to security breaches and restricted access data leakage in up-to-date information and communication technologies (ICT). The most popular and effective attacks are linear and differential cryptanalysis (LDC) as well as quantitative security assessment characterizing practical security against LDC is actual research task. Another valuable parameter is cryptographic data processing speed; as a rule it is decreasing in algorithms with high processing complexity. As time goes on some algorithms become worn out and outdated (i.e. DES, GOST 28147-89) as well as new more secure and high-speed algorithms are used in modern ICT (webapplications, IoT, blockchain, critical infrastructure). From this position, in this paper method of cryptographic security algorithms constructing for critical applications has been improved. This method uses substitution tables with increased capacity and randomized linear and non-linear operations. On the basis of this method, new advanced block cipher (BC) was proposed and its specifications were given. At the same time, analytical upper bounds of parameters characterized practical security of proposed BC against LDC were calculated. Besides, speed characteristics of developed BC were also evaluated. The results of experimental study showed that proposed cipher provides practical security against LDC with more high-speed in comparison with modern BC. Future research study can be related to practical cryptographic security assessment against other cryptanalysis methods.</p>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>cryptography</kwd>
        <kwd>encryption</kwd>
        <kwd>block cipher</kwd>
        <kwd>cryptographic algorithm</kwd>
        <kwd>practical security</kwd>
        <kwd>linear and differential cryptoanalysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The CIA triad is one of the most popular and valuable model of information security
(cybersecurity) ensuring in information and communication technologies (ICT). It
contains three basic following characteristics: confidentiality, integrity and
availability. Confidentiality and integrity provides by cryptographic methods and
tools [1-3]. Particularly, integrity provides by hash-functions or EDS as well as
confidentiality provides by using symmetric (secret key cryptography, SKC) [2] and
assymetric (Public Key Crytpography, PKC) ciphers [3]. The encryption process by
symmetric ciphers is faster approximately in 102-103 times and it needs less
computational capabilities.</p>
      <p>Moreover, all cryptographic methods’ the undeniable advantage is protection the
data itself rather than access to it. The principal criterion of choosing cryptosystems is
the security level against some categories of cyberattacks. But for some specifical
targets, the cryptographic data processing speed (as in the case of PKC or some
up-todate applications based on SKC) plays a key role [4-5].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related papers analysis and problem definition</title>
      <p>Despite the diversity of modern cryptographic methods and tools, not all of them have
required level of efficiency (security and speed) to provide guaranteed data
protection. There are many threats related to security breaches and restricted access
data leakage in up-to-date ICT. Also the development and cost reduction of ICT
positively affects the effectiveness of cryptanalysis, one of the most effective methods
of which is linear and differential cryptanalysis (LDC) [6-8].</p>
      <p>In the paper [4] two high-performance reliable block ciphers (BC) were proposed
and its speed and security against LDC was estimated in comparison with most
effective modern BCs like AES, Kalyna etc. Latest research papers [7-11] are
oriented on quantitative estimation of BC security against LDC.</p>
      <p>As time goes on some algorithms become worn out and outdated (i.e. DES, GOST
28147-89). New more secure and high-speed algorithms are used in modern ICT
(web-applications, IoT, blockchain, critical infrastructure). ICT development as well
as cryptanalysis methods and tools enforces to cryptographic security methods
improvements and creating new ciphers based on these [12-14]. From this viewpoint,
the main purpose of this paper is to study the efficiency (security level and speed
parameters) of the new advanced BC.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Mathematical background for method of cryptographic security algorithms constructing</title>
      <p>Suppose t , p , r , q are natural numbers, t = 2t , p = 2 p , r = 2r + 1 , n = tp ,
q = pq , w = p , k = 2n , b = 2q (parameter b defines the quantity of different
substitution tables (substitutions), which can be used in the method). Then the r
rounded ciphering method  with thesetof cleartext messages (messages to encrypt)
Vn = 0,1n , the set of secret keys Vk and the set of round keys Vn+q+w can be described
by following sequence of stages:</p>
      <p>Stage 1 – Round keys producing</p>
      <p>At this stage ther number of round keys Ki , Ki Vn+q+w , i = 1, r is produced from
the secret key K , K Vk .</p>
      <p>Step 1.1. Decomposing secret key K , K Vk :</p>
      <p>K = ( B−4 , B−3 , B−2 , B−1 ) , Bj Vn 2 , j = −4, −1 .
(1)
Step 1.2. Producing vectors B j , Bj Vn 2 , j = 0, c −1, c = 4r (n + q + w) n :
 ( S ( Bj−4 ,W1, p)  ( Bj−2  P1 )  Bj−1  Q1 )  Bj−3

, j mod 4 = 0
Bj = ( S ( Bj−3  Bj−1,W2 , p)  ( Bj−2  P2 )  Q2 )  Bj−4 , j mod 4 = 1 , (2)
( Bj−4  ( S ( Bj−3 )  P3 ,W3 , p)  Bj−1  Q3 )  Bj−2 , j mod 4 = 2

 ( S ( Bj−4  P4 ,W4 , p)  Bj−3  Bj−2  Q4 )  Bj−1 , j mod 4 = 3
where  is the Boolean operation of binary vectors coordinate wise addition,
X  Y is the dynamic rotate left of bit sequence X for Y times, and X  Y is
the dynamic rotate right of the bit sequence X for Y times, Wi , Pi , Qi are some
constants, Wi , Pi , Qi Vn 2 , i = 1, 4 .</p>
      <p>The substitution S is defined via following formula:</p>
      <p>S ( x, y, z ) = ( syz−1 ( xz−1 ) , ... , sy0 ( x0 )) , x = ( xz−1, ... , x0 ) , y = ( yz−1, ... , y0 ) ,
(3)
where x j Vt , y j Vq , sy j is the substitution table for the set Vt (one substitution
table is chosen among b possible variants by index y j ), j  0, z −1.</p>
      <p>Step 1.3.</p>
      <p>Vectors</p>
      <p>Ci , Ci Ve ,
i = 1, r ,
e = e n 2 ,
e = 2 (n + q + w) n

areformed
by
concatenation
of
vectors</p>
      <p>B j ,</p>
      <p>Bj Vn 2 ,
j = 0, c −1,
c = 4r (n + q + w) n in inverse order (to form one vector Ci it should be used e
number of vectors B j ):</p>
      <p>Ci = ( Bc−1−(i−1)e || Bc−1−(i−1)e−1 || ... || Bc−1−(i−1)e−e+1 )
Step 1.4. Calculaion of round keys K i , Ki Vn+q+w , i = 1, r :</p>
      <p>Ki = (Ci  i ) mod 2n+q+w .</p>
      <p>The obtained keys K i , Ki Vn+q+w , i = 1, r will be used for secret message
encryprion and decryption.</p>
      <p>Stage 2 – Encryption procedure</p>
      <p>At this stage the secret message is encrypted А = ( A1, A2 , A3 ,..., Au ) , А Vnu ,
Аj Vn , j = 1, u , where u is a natural number.</p>
      <p>The encryption function of each Аj Vn , j = 1, u is following:</p>
      <p>F = fr, Kr ... f1, K1 .
(4)
(5)
(6)
 ( x  k (1) , k (2) , k (3) ) , if i  r
fi, Ki ( x) = 
 S ( x  k (1) , k (2) , p ) , if i = r

,
where k (1) , k (2) , k (3) are parts of round key K i ( k = (k (1) , k (2) , k (3) ) , k (1) Vn ,
k (2) Vq , k (3) Vw ).</p>
      <p>The substution S is defined in (3) and the substitution  is defined by follow:
 ( x, y, h) = S ( x, y, p ) M (h) , x Vn , y Vq , h Vw
where x = ( xp−1, ... , x0 ) , y = ( yp−1, ... , y0 ) , x j Vt , y j Vq .</p>
      <p>M (h) is the invertible matrix 2 p  2 p over Galuis field GF ( 2t ) , which depends
on h , and the multiplication S ( x, y, p) = ( syp−1
( xp−1 ) , ... , sy0 ( x0 )) on M (h) in (8) is
accomplished over this field in the following way:
1. Parameter sy ( x j ) ( j  0, p −1 ) is decomposed on 2 t  -bit parts.</p>
      <p>j
( syj ( x j ) = ( syj ( x j )(1) , syj ( x j )(2) ) , syj ( x j )(1) , syj ( x j )(2) Vt ).
2. The vector B is formed from the part syj ( x j ) ( j  0, p ):
3. Vector B</p>
      <p>B = sy0 ( x0(1) ) | | sy0 ( x0(2) ) | | ... | | syp−1 ( xyp−1(1) ) | | syp−1 ( xyp−1(2) ) .</p>
      <p>and M (h) multiplying is accomplished over binary vector
identification B j j  0, 2 p −1 ( Bj Vt ) of the matrix M ( p) elements.</p>
      <p>The round function fi, Ki for all x Vn , Ki Vn+q+w , i 1, r is described as follows:
(7)
(8)
(9)
(10)
(11)</p>
    </sec>
    <sec id="sec-4">
      <title>4. Security analysis</title>
      <p>On the basis of paper [9], for the proposed method analytical upper bounds of the
parameters that characterize its practical security against cyberattacks of LDC are
obtained as following:</p>
      <p> rBM 2+1
EDP ()  </p>
      <p> rBM 2+1
ELP ()  
  rBM 2+1 ,</p>
      <p>
  rBM 2+1 ,

where EDP () is the average probability of differential characteristic  , ELP () is
the average probability of linear characteristic  , BM is M matrix branching index,
 
and the parameters  ,  ,  ,  are defined via the following formulas:
 = max d(sj ) ( ,  ) : ,  Vt \ 0, j  0, b −1 ,
 = max l(sj ) ( ,  ) : Vt ,  Vt \ 0, j  0, b −1 ,
 = max b−1  d(sj ) ( ,  ) : ,  Vt \ 0 ,
 b−1 </p>
      <p> j=0 
 = max b−1 b−1 l(sj ) ( ,  ) : Vt ,  Vt \ 0 .
 
 j=0 
(14)</p>
      <p>In (11) – (14) d(sj ) is the difference table of the substitution s j ( j  0, b −1) over
the bitwise addition operation modulo 2 and l(sj ) ( ,  ) are the tables of linear
approximation of the substitution s j ( j  0, b −1) over this operation.</p>
    </sec>
    <sec id="sec-5">
      <title>5. New advanced BC development</title>
      <p>New advanced BC is developed on the basis of proposed method. Such parameters
were chosen for he purposes of this BC: t = 8 , t = 2t = 16 (substitution tables
capacity), p = 4 , p = 2 p = 8 , r = 4 , r = 2r + 1 = 9 (number of rounds), n = tp = 128
(size of data block in bits), q = 3 , q = pq = 24 , b = 2q = 8 (8 substitution tables are
used over the set V16 ), w = 8 , k = 2n = 256 (size of secret keys in bits).</p>
      <p>The proposed cipher works with 128-bit data blocks and supports a 256 bits length
secret key. When expanding a secret key, the required number of 160-bit round keys
is generated ( n + q + w = 128 + 24 + 8 = 160 ). Data blocks and extended keys are
represented as 8×2 byte matrix.</p>
      <p>For proposed BC the producing round key sprocedure is accomplished via
formulas (1) – (5).</p>
      <p>At the first step one 256-bit round key K is divided into 4 parts:
K = ( B−4, B−3, B−2, B−1 ) 64 bit lentgth for each.</p>
      <p>Then at the second step 2 auxilliary 64-bit vectors are calculated B j , j = 0, 44 (
c = 4r (n + q + w) n =</p>
      <p>4  9  (128 + 24 + 8) /128 = 45 ). Here with it is used 64-bit
constants Wi , Pi , Qi , i = 1, 4 (see the values of these constants in the Table 1).
Also in step two the substitution S uses 8 substitution tables 1616 bits.</p>
      <p>These substitution tables are set up using the calculation of the field inverse
element
the GF (2)
(C / X )−1  GF (216 )
with the further execution of Affine transformation over</p>
      <p>S ( X ) = M  (C / X )−1 + V ,
(15)
where X , C,V  GF (216 ) , and M is the invertible square matrix over GF (2) , size of
which is 1616 .</p>
      <p>The parameters C , V and M are presented in hexadecimal values in the Table 2
(each row of matrix M is presented as a single hexadecimal number).</p>
      <p>AddKeyMod 2 ( state, SubKey(1) ) implies a bitwise modulo 2
addition of 2 corresponding bits of the round key SubKey(1) and the data block state .</p>
      <p>MixColumns ( state) operation rempresents the linear transformation of matrix
state . During this operation each 8-byte column of data block state is considered as a
polynomial over a field GF ( 28 ) with 8 terms, which is multiplied by fixed polynom (
c ( x ) raised to the power of 7 over the modulo x8 + 1 . As a polynomial c ( x ) was
chosen the following polinomial: c ( x ) = 3x7 + 7x6 + x5 + 3x4 + 7x3 + 4x2 + 1Dx + 1
(factors are represented in hexadecimal format). As an irreducible polynomial the
following polynomial was chosen: m ( x ) = x8 + x7 + x5 + x4 + x + 1 .</p>
      <p>Proposed BC encryption procedure
Input: 128-bit datab lock state , 160-bit round keys
SubKeyi = ( SubKeyi(1) , SubKeyi(2) , SubKeyi(3) ) , i = 0, r ,
SubKeyi(1) V128 , SubKeyi(2) V24 , SubKeyi(3) V8 .</p>
      <p>Output: 128-bit data block state .
1. state = AddKeyMod 2 (state, SubKey0(1) ) ;
2.
2.1.
2.2.
2.3.
2.4.</p>
      <p>For i =1, i  r, i + + do
state = SubBytes ( state, SubKeyi(2) ,8) ;
state = ShiftRows ( state, SubKeyi(3) ) ;
state = MixColumns (state) ;
state = AddKeyMod 2 (state, SubKeyi(1) ) ;
3. state = SubBytes ( state, SubKeyr(2) ,8) ;
4. state = ShiftRows ( state, SubKeyr(3) ) ;
5. state = AddKeyMod 2 (state, SubKeyr(1) ) ;
6. return state .</p>
      <p>Fig. 1. The new BC encryprion procedure pseudocode
In SubBytes ( state, SubKey(2) , 8) operation the tabular substitution of every 16 bits of
the data block state is performed.</p>
      <p>This BC uses 8 tables over the set V16 , where in the choise of the particular table in
each round depends on the part of round key SubKey(2) according to the formula (3).</p>
      <p>The substitution tables were generated according to the formula (15), the
parameters C , V and M , used in generation are presented in Table 2. Substition
tables datais selected so that there are no fixed points,and also that for each
substitution table of BC the equality for the parameters is executed:  =  = 2−14 .</p>
      <p>In ShiftRows ( state, SubKey(3) ) operation depending on the part of the round keys
SubKey(3) a byte wise shift of elements in the rows of the matrix state is performed.
The length of the round key SubKey(3) part is 8 bit, so each bit of current vector
affects on the shift of corresponding row of the matrix state .</p>
      <p>For instance, if the first bit of the vector SubKey(3) equals 1, then the values of the
columns of the first matrix state row are swapped, if the first bit of the vector
SubKey(3) equals 0, then the values of columns are not changed. See decryption
procedure pseudocode at the Fig. 2.</p>
      <p>Proposed BC decryption procedure
Input: 128-bit data block state ,160-bit round keys
SubKeyi = ( SubKeyi(1) , SubKeyi(2) , SubKeyi(3) ) , i = 0, r ,
SubKeyi(1) V128 , SubKeyi(2) V24 , SubKeyi(3) V8 .</p>
      <p>Output: 128-bit data-block state .
1. state = AddKeyMod 2 (state, SubKeyr(1) ) ;
2. For i =1, i  r, i + + do
2.1. state = ShiftRows (state, SubKeyr−i+1(3) ) ;
2.2.</p>
      <p>state = InvSubBytes ( state, SubKeyr−i+1(2) ) ;
2.3. state = AddKeyMod 2 (state, SubKeyr−i(1) ) ;
2.4. state = InvMixColumns ( state) ;
3. state = ShiftRows ( state, SubKey1(3) ) ;
4. state = InvSubBytes (state, SubKey1(2) ) ;
5. state = AddKeyMod 2 (state, SubKey0(1) ) ;
6. return state .</p>
      <p>Fig. 2. The new BC decryption procedure pseudocode
state , which is inverse to</p>
      <p>The InvMixColumns ( state) operation is a linear transformation of the matrix
MixColumns ( state) operation. In this operation every
8GF ( 28 )
byte column of a data block state is considered as a polynomial over a field
with 8 terms, which is multiplied by the fixed polynomial d ( x) raised to the power of
7 modulo x8 + 1 .</p>
      <p>The following polynomial is chosen as a polynomial
d ( x ) = 7 Ax7 + A1x6 + F 8x5 + EEx4 + 29x3 + 89x2 + EBx + 51 (factors are represented
in hexadecimal format).</p>
      <p>In the InvSubBytes ( state, SubKey(2) ) operation the tabular substitution of each 16
bit of data block state . This operation is inverse to SubBytes ( state, SubKey(2) )
operation, so it uses the inverse substitution tables in comparing with
SubBytes ( state, SubKey(2) ) tables.
d ( x ) :</p>
    </sec>
    <sec id="sec-6">
      <title>6. Experimental study and discussion</title>
      <p>For experimental study purposes (security and speed assessment), developed BC was
implemented as a console application.</p>
      <p>The sequences statistical properties, created using this application (in the counter
mode), were investigated in NIST STS statistical tests environments [15] as well as in
DIEHARD technique. The statistical portraits of the proposed BC are shown in Fig. 3.
For comparison purposes, the results of the sequences testing generated by proposed
BC, GOST 28147-89, Kalyna, AES ciphers are given in Table 3.</p>
      <p>Generator
BBS
Kalyna
GOST 28147-89
AES
Proposed BC
As can be seen from the results, proposed BC passed a comprehensive control over
the NIST STS (Fig. 3) and DIEHARD techniques and showed no worse results than
the ciphers above.
The speed characteristics of ciphers are also studied. It has been shown
experimentally that the proposed BC is faster than the GOST 28147-89 cipher
approximately in 3.11 times, and 1,27 times or the Kalyna and AES ciphers (see
Table 4). The research was conducted in the same conditions on Intel (R) Core (TM)
i7-2600K CPU 3.4 GHz.
Also the security ratings of the proposed BC over the methods of LDC are calculated.
Accorfing to (9) – (14) formulas the parameters upper bounds values, characterizing
this BC practical security against LDC methods are calculated:  =  = 2−14 ,
r = 4 , BM = 9 – EDP()  2−294 , ELP()  2−294 and number of round keys r = 9 .
This results shows that if the r  9 then the practical security of the proposed BC
over the foregoing cryptoanalysis methods [18-21] is provided.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions and future research study</title>
      <p>In this paper the cryptographic security method was developed, which can increase
the effectiveness of cryptographic security by using new procedures sequence of
operations in generating round keys and encryption (using substitution tables with
increased capacity and randomized linear and non-linear operations).</p>
      <p>On the basis of this method, symmetric BC was developed. The values of
parameters upper bounds characterizing its practical resistibility to cyber attacks of
LDC are calculated.</p>
      <p>Under the same conditions, experimental studies were carried out to evaluate the
speed characteristics of ciphers, which showed that proposed BC is faster than the
GOST 28147-89 cipher approximately in 3.11 times, and 1,27 times for the Kalyna and
AES ciphers.</p>
      <p>Also, the statistical properties of the sequences generated by proposed BC were
investigated. As a result, it was shown that this BC cipher passed a complex control of
the NIST STS and DIEHARD techniques and showed no worse results than other
ciphers.</p>
      <p>Future research study can be related with practical cryptographic security
assessment of proposed BC against other cryptanalysis methods [16-17].</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>This scientific work was financially supported as a part of Ukrainian Young Scientists
Project of Ministry of Education and Science of Ukraine as well as joint project of
Shota Rustaveli National Science Foundation of Georgia and Science &amp; Technology
Center in Ukraine, Project N6321 [STCU-2016-08].</p>
    </sec>
    <sec id="sec-9">
      <title>References</title>
      <p>2.
3.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>“New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis”</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>1126</volume>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>104</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Yeoh W</surname>
            . -.,
            <given-names>Teh J. S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sazali</surname>
            <given-names>M. I. “</given-names>
          </string-name>
          <article-title>µ2: A lightweight block cipher”</article-title>
          ,
          <source>Lecture Notes in Electrical Engineering</source>
          , vol.
          <volume>603</volume>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>290</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , I. Svatovskij,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiyan</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Pushkar</surname>
          </string-name>
          <article-title>'ov, “Code-based public-key cryptosystems for the post-quantum period”</article-title>
          ,
          <source>Proceedings of 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science</source>
          and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          ,
          <year>Kharkiv</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kinzeryavyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Prysiazhnyi</surname>
          </string-name>
          , Kh. Yubuzova, “
          <article-title>High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks”</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2104</volume>
          , pp.
          <fpage>657</fpage>
          -
          <lpage>668</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>“Studies on Statistical Analysis and Performance Evaluation For Some Stream Ciphers”</article-title>
          ,
          <source>International Journal of Computing</source>
          , vol.
          <volume>18</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>82</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Zodpe H.</given-names>
            ,
            <surname>Sapkal</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          “
          <article-title>FPGA-Based High-Performance Computing Platform for Cryptanalysis of AES Algorithm”</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          , Springer, vol.
          <volume>1025</volume>
          , pp.
          <fpage>637</fpage>
          -
          <lpage>646</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Yang</surname>
            <given-names>D.</given-names>
          </string-name>
          , Qi W.-F.,
          <string-name>
            <surname>Chen H</surname>
          </string-name>
          .
          <article-title>-</article-title>
          J. “
          <article-title>Provable security against impossible differential and zero correlation linear cryptanalysis of some feistel structures”</article-title>
          , Designs, Codes, and Cryptography, vol.
          <volume>87</volume>
          (
          <issue>11</issue>
          ), pp.
          <fpage>2683</fpage>
          -
          <lpage>2700</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Liu H.</given-names>
            ,
            <surname>Kadir</surname>
          </string-name>
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          “
          <article-title>Cryptanalysis and constructing S-box based on chaotic map and backtracking”</article-title>
          .
          <source>Applied Mathematics and Computation</source>
          , vol.
          <volume>376</volume>
          ,
          <issue>125153</issue>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Alekseichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          , E. Skrynnik, “
          <article-title>Rating of practical resistance of Kalyna block cipher relative to the difference methods, linear cryptanalysis and algebraic attacks based on homomorphisms”</article-title>
          , Applied Radio Electronics,
          <year>2008</year>
          ,
          <volume>7</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>203</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Blondeau</surname>
          </string-name>
          , K. Nyberg, “
          <article-title>New Links between Differential and Linear Cryptanalysis”</article-title>
          ,
          <source>Proc. of Annual Intern. Conf. on the Theory and Applications</source>
          of Cryptographic Techniques “Advances in Cryptology, EUROCRYPT-2013”, Springer Verlag, pp.
          <fpage>388</fpage>
          -
          <lpage>404</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Kanda</surname>
          </string-name>
          , “
          <article-title>Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function”, Selected Areas in Cryptography, SAC 2000</article-title>
          , Proceedings, Springer Verlag,
          <year>2001</year>
          , pp.
          <fpage>324</fpage>
          -
          <lpage>338</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>Hu Z.</given-names>
            ,
            <surname>Gnatyuk</surname>
          </string-name>
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Kovtun</surname>
          </string-name>
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Seilova</surname>
          </string-name>
          <string-name>
            <surname>N.</surname>
          </string-name>
          “
          <article-title>Method of searching birationally equivalent Edwards curves over binary fields”</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>754</volume>
          , pp.
          <fpage>309</fpage>
          -
          <lpage>319</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Dawood</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rahma</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Hossen, “
          <article-title>The New Block Cipher Design (Tigris Cipher)”</article-title>
          ,
          <source>International Journal of Computer Network and Information Security (IJCNIS)</source>
          , vol.
          <volume>7</volume>
          , No.
          <volume>12</volume>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>18</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>Gnatyuk S.</given-names>
            ,
            <surname>Kinzeryavyy</surname>
          </string-name>
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Kyrychenko</surname>
          </string-name>
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Yubuzova</surname>
          </string-name>
          <string-name>
            <given-names>Kh.</given-names>
            ,
            <surname>Aleksander</surname>
          </string-name>
          <string-name>
            <given-names>M.</given-names>
            and
            <surname>Odarchenko</surname>
          </string-name>
          <string-name>
            <surname>R.</surname>
          </string-name>
          “
          <article-title>Secure Hash Function Constructing for Future Communication Systems</article-title>
          and Networks”,
          <source>Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>902</volume>
          , pp.
          <fpage>561</fpage>
          -
          <lpage>569</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>A Statistical</given-names>
            <surname>Test</surname>
          </string-name>
          <article-title>Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications</article-title>
          . NIST Special Publication 800-22, May 15,
          <year>2001</year>
          ,
          <volume>164</volume>
          р.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y. Zhao,</surname>
          </string-name>
          “
          <article-title>Security Cryptanalysis of NUX for the Internet of Things”</article-title>
          ,
          <source>Security and Communication Networks</source>
          , vol.
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Jordan</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          , “Quantum Cryptanalysis: Shor, Grover, and Beyond”,
          <source>IEEE Security &amp; Privacy</source>
          , vol.
          <volume>16</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>Yeoh W.</given-names>
            ,
            <surname>Teh</surname>
          </string-name>
          <string-name>
            <given-names>J. S.</given-names>
            , &amp;
            <surname>Sazali</surname>
          </string-name>
          <string-name>
            <surname>M. I. “</surname>
          </string-name>
          <article-title>µ2: A lightweight block cipher”</article-title>
          ,
          <source>Lecture Notes in Electrical Engineering</source>
          , vol.
          <volume>603</volume>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>290</lpage>
          ,
          <year>2020</year>
          , doi:10.1007/
          <fpage>978</fpage>
          -981-15-0058-9_27 Liu H.,
          <string-name>
            <surname>Kadir</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            <given-names>C.</given-names>
          </string-name>
          “
          <article-title>Cryptanalysis and constructing S-box based on chaotic map and backtracking”</article-title>
          .
          <source>Applied Mathematics and Computation</source>
          , vol.
          <volume>376</volume>
          ,
          <issue>125153</issue>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Sušil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sepehrdad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vaudenay</surname>
          </string-name>
          et al, “
          <article-title>On selection of samples in algebraic attacks and a new technique to find hidden low degree equations”, Information security</article-title>
          and privacy, Cham: Springer, pp.
          <fpage>50</fpage>
          -
          <lpage>65</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>