Abdul Mohsen J. Abdul Hossen

Work place: Computer Science Department, University of Technology Baghdad, Iraq

E-mail: Abdulmoohsen53@yahoo.com

Website:

Research Interests: Computational Mathematics, Mathematics

Biography

Abdul Mohssen J. Abdul Hossen is an Associate Professor of Applied mathematics, Computer Science Department, University of Technology, where he teaches undergraduate and graduate courses in Mathematics. Dr. Abdul Hossen received the B.Sc. in Mathematics from Mustansiriyah University, Iraq 1977, the M.Sc. degree in Applied Mathematics from Bagdad University, Iraq. in1980, the Ph.D. in Applied Mathematics from University of Technology, Iraq, 2005.  He is a member of the IEEE system, and Member of the Editorial Journal.

Author Articles
The New Block Cipher Design (Tigris Cipher)

By Omar A. Dawood Abdul Monem S. Rahma Abdul Mohsen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijcnis.2015.12.02, Pub. Date: 8 Nov. 2015

In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published. It has been designed with a good coherent structure that is based on solid algebraic and well mathematical opinions. The proposed cipher uses the SPN structure and what is known by the Galois Field GF (28). It is an iterated cipher that has a conservative design which is easily implemented on both hardware and software. It operates with block size of 128-bits and with three variable key lengths of 128-bits, 192-bits and 256-bits in addition to sixteen rounds or multiples of four rounds. The proposed cipher works with good invertible operations’ stages and a compact duplicated ciphering key. The Tigris cipher construction strategy includes the adoption of construction a new S-box with high non-linearity that uses the same routines of the AES-S-box stage but with different modular arithmetic of irreducible polynomial and different affine matrix in addition to the distinct constant vector. The second and the third layers of the proposed model are based on the shifting concept for the confusion and diffusion process with reversible operations. The last layer of the proposed model is the key addition layer that is responsible for the expanding and generating the ciphering key by two directions those of row and column expansion, which are associated with two constant vectors of golden ratio and base nature algorithm as a fixed word to eliminate any weak or semi-weak ciphering key.

[...] Read more.
Other Articles