The Encryption Algorithms AES-PES16-1 and AES-RFWKPES16-1 based on Networks PES16-1 and RFWKPES16-1

Article ID

CSTNWS0D67Y

The Encryption Algorithms AES-PES16-1 and AES-RFWKPES16-1 based on Networks PES16-1 and RFWKPES16-1

Gulom Tuychiev
Gulom Tuychiev
DOI

Abstract

In this article we developed a new block encryption algorithm based on network RFWKIDEA32-1 using of the transformations of the encryption algorithm AES, which is called AESRFWKIDEA32- 1. The block’s length of this encryption algorithm is 256 bits, the number of rounds are 10, 12 and 14. The advantages of the encryption algorithms are that, when encryption and decryption process used the same algorithm. In addition, the encryption algorithm AES-RFWKIDEA32-1 encrypts faster than AES.

The Encryption Algorithms AES-PES16-1 and AES-RFWKPES16-1 based on Networks PES16-1 and RFWKPES16-1

In this article we developed a new block encryption algorithm based on network RFWKIDEA32-1 using of the transformations of the encryption algorithm AES, which is called AESRFWKIDEA32- 1. The block’s length of this encryption algorithm is 256 bits, the number of rounds are 10, 12 and 14. The advantages of the encryption algorithms are that, when encryption and decryption process used the same algorithm. In addition, the encryption algorithm AES-RFWKIDEA32-1 encrypts faster than AES.

Gulom Tuychiev
Gulom Tuychiev

No Figures found in article.

Tuychiev Gulom. 2015. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 15 Issue E4
Pg. 33- 41
Classification
GJCST-E Classification: C.2.1
Keywords
Article Matrices
Total Views: 8086
Total Downloads: 2177
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

The Encryption Algorithms AES-PES16-1 and AES-RFWKPES16-1 based on Networks PES16-1 and RFWKPES16-1

Gulom Tuychiev
Gulom Tuychiev

Research Journals