We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A 64 bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)

by Ahmed Elshafee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 13
Year of Publication: 2012
Authors: Ahmed Elshafee
10.5120/9174-3575

Ahmed Elshafee . A 64 bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64). International Journal of Computer Applications. 57, 13 ( November 2012), 16-24. DOI=10.5120/9174-3575

@article{ 10.5120/9174-3575,
author = { Ahmed Elshafee },
title = { A 64 bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64) },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 13 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number13/9174-3575/ },
doi = { 10.5120/9174-3575 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:20.974328+05:30
%A Ahmed Elshafee
%T A 64 bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64)
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 13
%P 16-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents an improved version of KAMFEE cipher [1]. The proposed cipher (KAMFEE-X64) is designed to be compatible with the new 64 bits microprocessors unlike the old cipher (KAMFEE) which is designed for systems based on x86 microprocessors. KAMFEE-X64 has a key dependent block length and key dependent rounds, enhanced by a rotor. The number of rotor's wheels depends on key length too, rotor is implemented using successive 64 bits affine transformations. Its block is divided into basic blocks of 64 bits length. 264 modulo addition and 64 bits XORING are used. It uses 64 bits sboxes implemented using 64 bits affine transformation. Two steps of permutation are used, first step is basic block permutation and second step is basic block mixing. The strength of this system is compared with the KAMFEE and the well-known RC6, and RIJNDAEL ciphers. KAMFEE-X64 cipher gives excellent results from security characteristics and statistical point of view of. So authors suggests to use KAMFEE-X64 in the area of banking and electronic fund transfer.

References
  1. Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C by Bruce Schneier. Wiley Computer Publishing, John Wiley & Sons, Inc.
  2. C. Shannon, Conication Theory of Secrecy Systems, Bell System Tech. . J. , Vol. 28, 1949.
  3. Rivest: Ronald L. Rivest, "The RC5 Encryption Algorithm'', document made available by FTP and World Wide Web, 1994.
  4. J. Daemen, J. T. Rijmen, "AES Proposal: RIJNDAEL. AES Algorithm Submission", 1999.
  5. Elkamchouchi, H. M. ; Elshafee, A. M. , "REBC, Rotor Enhanced Block Cipher"; Radio Science Conference, 2002. (NRSC 2002). Proceedings of the Nineteenth National Radio Science Conference, 19-21 March 2002 Page(s):262 - 269. Digital Object Identifier 10. 1109/NRSC. 2002. 1022631
  6. Elkamchouchi, H. M. ; Elshafee, A. M. , "Dynamically Key-controlled Symmetric Block Cipher KAMFEE"; Radio Science Conference, 2003. NRSC 2003. Proceedings of the Twentieth National, 18-20 March 2003 Page(s):C19 - 1-12, Digital Object Identifier 10. 1109/NRSC. 2003. 1217353
  7. ElKamchouchi, H. ; ElShafee, A. , "Cyclone, the two Dimensional Rotor, Rotor's New Generation"; Radio Science Conference, 2005. NRSC 2005. Proceedings of the Twenty-Second National, March 15-17, 2005 Page(s):269 – 276.
  8. ElKamchouchi, H. ; ElShafee, A. , "RotRix, The Arrayed Rotors"; Radio Science Conference, 2006. NRSC 2006. Proceedings of the Twenty-Third National Radio Science Conference.
  9. "New Rotor Based Symmetric Cipher"; IEEE International Conference on Signal Processing and Communication. Proceedings of IEEE ICSPC, 24-27 November, 2007, Dubai, United Arab Emirates, paper ID 1569047958.
  10. "REBC2 cipher"; IEEE Africon 2007. Proceedings of the Africon 2007, September 26-28, 2007, Namebia, paper ID 624.
  11. "URESC, Unbalanced Rotor Enhanced Symmetric Cipher"; The 14th IEEE Mediterranean Electrotechnical Conference, Ajaccio, France, May 5-7, 2008, paper ID t1-sd1018.
Index Terms

Computer Science
Information Sciences

Keywords

X64 systems block cipher rotor cipher brute force attack