Page 14 - tmp
P. 14

NAUTILUS ENCRYPTION ALGORITHM


                                                      NEBOJŠA SIMIĆ

                                                      USTANIČKA 64

          INTRODUCTION
          This paper describes Nautilus encryption algorithm which   Best way to use Nautilus is to use it as hash function.
          I have constructed, designed and implemented. Algorithm   Nautilus is strong one way function, it's impossible for
          is  designed  in  a  way  that  it  can  be  implemented  for   collision to occur, it has fixed output size, it's fast and it
          multiple purposes with small changes or no changes at all.   can take larger inputs. The fact that Nautilus is strong one
          Nautilus  can  be  used  as  compression  algorithm,  hash   way function relies on a fact that is hard to determine
          function, algorithm for bulk encryption and algorithm for   relationship between 16 and 2401 characters or opposite.
          continuous  data  stream  encryption.  All  of  stated  uses  of   There cannot be collisions between 2 different texts
          Nautilus  differ  just  in  number  of  rounds  needed  for   because there is more plausible shuffles of input in C-box
          encryption.                                            than all plausible combinations of 16 character long text.
                                                                 Also similar inputs will result in similar output ,which is
                 Nautilus isn't composed out of complicated      one more desired property of perfect hash function.
          computation steps so it could encrypt bigger blocks of
          plain text. Time complexity of one round is quasilinear and      This algorithm is implementable on processors
          size of text is 7 times smaller than the text size in previous   with little more memory space and processors that are
          round and that provides faster encryption on bigger blocks   little bit faster. It's ideal for server
          of text.
                                                                 implementation or for any computer system that
                 Nautilus is symmetric-key block cipher with     works with large amount of data.
          block size of 2401 characters and with variable key length.
          Encryption has two phases first sub key computation, and      Nautilus could be described as algorithm that is
          plain text encryption. It iterates simple encryption and   fast, multi-purpose, easily implementable, secure and
          compression functions 4 times, but before encryption, keys   cryptanalysis resistant. Nautilus isn't necessarily
          must be computed. The block size can be up to 2401     cryptographic algorithm, it could be used as image
          characters long or 16807 bits but key size is variable, it   processing algorithm, steganography    algorithm
          varies from 16 characters to bigger, but choosing the   and for many other purposes.
          proper key length influences key computation time in big
          measure.                                               LITERATURE
                                                                 [1] Christoforus Juan Benvenuto, Galois field in
                                                                 Cryptography
                                                                 [2] G. H. Hardy and E.M. Wright, Number theory

                                                                 [3] James L. Massey ,The Discrete Fourier Transform in
                                                                 Coding and Cryptography

                                                                 [4] Erion Plaku and Igor E. Shparlinski  ,On Polynomial
                                                                 Representations of Boolean Functions Related to Some
                                                                 Number Theoretic Problems






          Figure 1Two Rounds of Nautilus Encryption Algorithm
          CONCLUSION
   9   10   11   12   13   14   15   16   17   18   19