7. A Non-Feistel Symmetric Key Encryption Algorithm

[Full PDF Text]


Raza Ali and Dr. Muhammad Ali .


Network security is the primary element to secure a communication network, and if an intruder still able to break this security element, the other and an important element is data encryption which hides the intelligence of data so that other than authorized entities cannot understand the encrypted data. This paper proposed a new shared key, block cipher encryption/decryption algorithm. The algorithm is designed keeping the features of non fiestel cipher and counter mode of block cipher is used in the algorithm. The encryption process starts by entering a key and counter value which is 128-bit long. From the 128-bit of key, decimal value is calculated and added between two counter values to make counter value 128-bit. To encrypt data, 128-bit key is used along with counter value. This new algorithm encrypts 128-bit plaintext block and produces 128-bit cipher text block using several encryption elements including matrix transposition, adding average value, key based bitwise transposition operation, and byte substitution. The algorithm is designed for secure communication applications. For the analysis of proposed algorithm different cryptanalysis techniques such as frequency attack, avalanche effect, throughput time and brute force attack are used, and the design is useful in terms of privacy, data confidentiality. The unique combination of encryption elements obscures the relationship between plaintext and cipher text.

Index Terms:

Encryption, Decryption, Key, Counter, Symmetric key cryptography, non-fiestel cipher.

Cite this: Raza Ali and Dr. Muhammad Ali, “ A Non-Feistel Symmetric Key Encryption Algorithm ”, BUJICT Journal, Volume 10,  Issue, II December 2017, pp. 1-5.


[1] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2 ed.: John Wiley and Sons, November 1995.
[2] A. Nadeem and M. Y. Javed, “A Performance Comparison of Data Encryption Algorithms,” in Information and Communication Technologies, 2005. ICICT 2005. First International Conference on, 2005, pp. 84-89.
[3] V. M. V. S.Sudha, K.Brindha, L. Agilandeeswari, G.Ramya, “Implementation of Enhanced Data Encryption Standard on MANET with less energy consumption through limited computation,” In Proceeding of International Journal of Engineering Research and Development, vol. 2, pp. 46-52, July 2012.
[4] Xin Zhou, Xiaofei Tang, Research and Implementation of RSA Algorithm for Encryption and Decryption, 2011 the 6th International Forum on Strategic Technology.
[5] YANG Xiao-guang. Analysis about ECC Algorithm and Program Realization[J]. vol. 3, September 2004, pp. 13-16
[6] B. A. Forouzan, Cryptography and Network Security: McGraw-Hill, 2008.
[7] C. Lanxiang and Z. Shuming, “The comparisons between public key and symmetric key cryptography in protecting storage systems,” in Computer Application and System Modeling (ICCASM), 2010 International Conference on, 2010, pp. V4-494-V4-502.
[8] L. R. D. Thomas Hardjono, Security In Wireless LANS And MANS: Artech House, 2005.
[9] N. Khanna, J. Nath, J. James, S. Chakraborty, A. Chakrabarti and A. Nath, “New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm,” 2011 International Conference on Communication Systems and Network Technologies, Katra, Jammu, 2011, pp. 125-130.
[10] D. Trinca, “Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography,” Third International Conference on Information Technology: New Generations (ITNG’06), Las Vegas, NV, 2006, pp. 464-469.
[11] M. M. Abdelwahab, “Encryption implementation based on symmetric algorithm using a key rounds upto four rounds,” 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, 2015, pp. 27-31.
[12] M. J. M. Chowdhury and T. Pal, “A New Symmetric Key Encryption Algorithm Based on 2-d Geometry,” 2009 International Conference on Electronic Computer Technology, Macau, 2009, pp. 541-544
[13] V. Mullick, “E-HATS: A symmetric key encryption algorithm with dynamic substitution rule,” 2014 9th International Conference on Industrial and Information Systems (ICIIS), Gwalior, 2014, pp. 1-6.
[14] D. H. Kurniawan and R. Munir, “Double Chaining Algorithm: A secure symmetric-key encryption algorithm,” 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-6.
[15] J. Narayanaswamy, R. V. Sampangi and S. Sampalli, “HIDE: Hybrid symmetric key algorithm for integrity check, dynamic key generation and encryption,” 2015 International Conference on Information Systems Security and Privacy (ICISSP), Angers, 2015, pp. 124-131.
[16] U. P. a. M. M. a. J. Jain, “Article: A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation,” International Journal of Computer Applications, vol. 42, pp. 9-15, 2012.
[17] G. S. Vishwa gupta, Ravindra Gupta, “Advance cryptography algorithm for improving data security,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, 2010.
[18] W. Stallings, Cryptography and Network Security: Principles and Practice, 5 ed.: Pearson, 2010.
[19] “Advanced Encryption Standard,” [online] 2014,
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard (Accessed: 8 August 2014).
[20] “NIST, Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, November 26, 2001, available at:
[21] S. M. Diesburg, C. R. Meyers, D. M. Lary, and A.-I. A. Wang, “When cryptography meets storage,” presented at the Proceedings of the 4th ACM international workshop on Storage security and survivability, Alexandria, Virginia, USA, 2008.
[22] R. Tirtea and G. Deconinck, “Specifications overview for counter mode of operation. Security aspects in case of faults,” in Electrotechnical Conference, 2004. MELECON 2004. Proceedings of the 12th IEEE Mediterranean, 2004, pp. 769-773
[24] “Floating-Point Operation per Second,” [online] 2014,
http://en.wikipedia.org/wiki/FLOPS (Accessed: 3 October 2014).
[25] “Frequency Analysis,” [online] 2014, http://en.wikibooks.org/ wiki/Cryptography/Frequency_analysis (Accessed: 8 October 2014).