Results of Assessment of NSA (New Stream Algorithm) Symmetrical Stream Encryption Algorithm by Cryptoanalysis Methods

Main Article Content

Z.T. Khudoykulov
I.M. Boykuziev
I.R. Rakhmatullaev

Abstract

In this paper, a new stream encryption algorithm called NSA (New Stream Algorithm) is proposed. This algorithm uses a 128-bit secret key and 128-bit seed vectors and produces a 64-bit output value in each round. The suitability of the algorithm for architectural and software implementations, security against resynchronization attack, linked key attack and linear correlation of output sequence attacks are evaluated. The robustness of the NSA algorithm against relevant key-based attacks and resynchronization attacks, as well as traditional methods such as differential and linear cryptanalysis, is analyzed in detail. The analysis results confirm that the NSA algorithm is a secure stream encryption algorithm. At the same time, the ability of the algorithm to resist various threats, including resistance to traditional and modern threats, is discussed. Analysis confirms that this algorithm is a secure stream encryption algorithm.

Article Details

How to Cite
Khudoykulov, Z., Boykuziev, I., & Rakhmatullaev, I. (2024). Results of Assessment of NSA (New Stream Algorithm) Symmetrical Stream Encryption Algorithm by Cryptoanalysis Methods. INTERNATIONAL JOURNAL OF THEORETICAL AND APPLIED ISSUES OF DIGITAL TECHNOLOGIES, 7(1), 66–72. https://doi.org/10.62132/ijdt.v7i1.165
Section
Articles

References

J. Daemen, “Cipher and hash function design strategies based on linear and differential cryptanalysis,” Doctoral Dissertation, March 1995, K. U. Leuven

Rakhmatullaevich R. I., Mardano-kulovich I. B. Analysis of cryptanalysis methods applied to stream encryption algorithms //Artificial Intelligence, Blockchain, Computing and Security Volume 1. – CRC Press, 2024. – С. 393-401.

Rahmatullayev I. R. Oqimli shifrlash algoritmlari va ularni vujudga kelish sabablari //International Journal of Theoretical and Applied Issues of Digital Technologies. – 2022. – Т. 2. – №. 2. – С. 119-128.

Raxmatullayebich R. I. Stream encryption algorithms and the basis of their creation //central asian journal of mathematical theory and computer sciences. – 2022. – т. 3. – №. 12. – с. 165-173.

Rahmatullayev I. A new key stream encryption algorithm and its cryptanalysis: The new stream encryption algorithm (NSA-New Stream Algorithm) is proposed in this work. The input parameters are considered a 128-bit secret key and 128-bit initialization vectors in the new algorithm. A 64-bit line is generated in each round as the output value. The architecture of the algorithm is particularly suitable for efficient hardware implementations, together with this, this algorithm is also suitable for software implementation ... //Scientific and Technical Journal of Namangan Institute of Engineering and Technology. – 2023. – Т. 8. – №. 1. – С. 146-157.

Rakhmatullaev I. Self-synchronizing (asynchronous) Stream Encryption Algorithms //Scientific Collection «InterConf». – 2023. – №. 164. – С. 249-254.

S. Fluhrer, M. Shamir, “Weaknesses in the Key Scheduling Algorithm of RC4,” Selected in Areas in Cryptography, SAC 2001, Springer-Verlag, LNCS 2259, pp. 1– 24, 2001.

A. Clark, J. Golic, W. Millan, L. Penna, L. Simpson, “The LILI-128 Keystream Generator,” NESSIE project submission, 2000, http://www.cryptonessie.org

S. Fluhrer, “Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family,” Fast Software Encryption, FSE 2001, Proceedings, pp. 142–151, 2001.

Khudoykulov Z. T., Rakhmatullaev I. R., Umurzakov O. S. H. NSA algoritmining akslantirishlari tanlanishining xavfsizlik talablarini bajarilishidagi o ‘rni //International Journal of Theoretical and Applied Issues of Digital Technologies. – 2023. – Т. 6. – №. 4. – С. 97-101.

P. Rogaway, D. Coppersmith, “A Software-Optimized Encryption Algorithm,” Journal fo Cryptography, Vol. 11, No. 4, pp. 273–287, 1998.

Rahmatullayev I.R. Algebraik kriptotahlil usuli va uning oqimli shifrlash algoritmlariga qoʻllanish asoslari: Algebraic Cryptanalysis Method and Basics of its Application to Stream Encryption Algorithm //International Journal of Theoretical and Applied Issues of Digital Technologies. – 2023. – Т. 4. – №. 2. – С. 96-102.