SYMMETRIC BLOCK ENCRYPTION ALGORITHMS AND METHODS FOR THEIR EVALUATION

Authors

  • Abdimurodova Muattar Termez State University, Master's Department Applied Mathematics (By Fields), 2nd Year Student Muzrabot Specialized School, Teacher of Mathematics

Keywords:

Symmetric encryption, block ciphers, AES, DES, Blowfish, cryptanalysis, performance evaluation, avalanche effect, cryptographic security

Abstract

Symmetric block encryption algorithms are fundamental to modern cryptography, enabling secure communication and data protection. These algorithms encrypt fixed-size blocks of plaintext into ciphertext using a shared secret key. With growing concerns about cybersecurity threats and performance demands, it is essential to evaluate encryption algorithms not only for security but also for efficiency and resistance to cryptanalysis. This paper provides an overview of major symmetric block ciphers, including DES, AES, and Blowfish, and explores various evaluation techniques, such as statistical analysis, performance benchmarking, and cryptanalysis. The results highlight the strengths and weaknesses of these algorithms in terms of security, computational efficiency, and suitability for different applications.

References

Diffie, W., & Hellman, M. E. (1977). Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, 10(6), 74–84. https://doi.org/10.1109/C-M.1977.217750

Electronic Frontier Foundation. (1998). Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. O’Reilly Media. https://www.wired.com/1998/07/fed-encryption-standard-exposed/

Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption Standard. Springer-Verlag.

Biryukov, A., Khovratovich, D., & Nikolić, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. Cryptology ePrint Archive, Report 2009/317. https://eprint.iacr.org/2009/317

Schneier, B. (1993). Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In Fast Software Encryption (pp. 191–204). Springer.

Nadeem, A. (2005). A Performance Comparison of Data Encryption Algorithms. IEEE Information and Communication Technologies, 84–89. https://doi.org/10.1109/ICTTA.2006.1684353.

Downloads

Published

2025-04-30

Issue

Section

Articles