Raphael P. Enciso, Karylle Andrei C. Velarde. 4 0

Enhancing the rectangle algorithm for text data encryption in mobile application utilizing BBSXOR, NONCEXOR and MODULO addition. 6 6 - - - - - - - - . - . - 0 . - . - 0 .

Undergraduate Thesis : (Bachelor of Science in Computer Science) : Pamantasan ng Lungsod ng Maynila, 2024.





5



ABSTRACT: This research study proposes an enhancement to improve the RECTANGLE block cipher algorithm by addressing its problems and strengthening its security by modifying its key schedule and encryption algorithm. RECTANGLE is a lightweight block cipher algorithm, designed for efficiency in resource-constrained environments and plays an important role in cryptographic systems. It was found that the RECTANGLE Algorithm has problems with its non-robust key generation and in the confusion and diffusion property of the encryption algorithm. This weaknesses could potentially lead to vulnerabilities and exploitation, posing a threat to the confidentiality and integrity of sensitive data. To enhance the Key Schedule Algorithm, the researchers have employed different methodologies such as the BlumBlumShub CSPRNG for Key Schedule Algorithm and for the Encryption Algorithm, researchers chose to incorporate ModuloAddition and NonceXOR to the encryption algorithm. The proposed enhancements address known weaknesses through tests and comparative analysis with previous algorithms. The frequency Tests have shown a 96% success rate on its p-value indicating a substantial enhancement related to the non-robust generation of Round Keys. Additionally, integrating the NonceXOR function improved the confusion property of the RECTANGLE Algorithm, reducing the correlation coefficient to <=1%. Avalanche Effect test results showed a commendable 55% avalanche effect, surpassing the minimum threshold of 50%, signifying robust randomization capabilities. The three conducted tests have demonstrated that the enhancements have achieved the desired outcomes. This allows the researchers to conclude that the enhanced algorithm has generated robust keys and posseses excellent confusion and diffusion properties. The enhancements improve the security and robustness of the cipher, making it a valuable contribution to the field cryptography.













5







2 = =









2




2 --0------


6 --0-- 2 --------



0 2 --


--20------





--------20--


--------20--


----2

/ 2

/ 2

/

/

© Copyright 2024 Phoenix Library Management System - Pinnacle Technologies, Inc. All Rights Reserved.