A MODIFIED ON TWOFISH ALGORITHM BASED ON CYCLIC GROUP AND IRREDUCIBLE POLYNOMIAL IN GF (28)
In this “article”, a “new “adjustment” is made on Two-fishalgorithm based on using a new operation called cyclic group extended # (CGE#) operation for increasing the randomness of algorithm. This isa new operation works on 8-bits and using 30 tables constructed with cyclic group and multiplication in Galois Field (GF) (28). A new (CGE#) operation is used instead of (X-OR)“operation in “each “round of Fe-istel of Two-fish. This is done by using dual keys: one key is used for selecting one table among 30 tables, and the other” key” is used for: encryption: and “decryption. The proposed algorithms are evaluated by using many security metrics such as complexity, NIST, histogram and correlation coefficients. The modification has givengood results in these metrics, and this leads to make the proposed algorithmmuch more robust against many the attacks.
It is herein agreed that:
The copyright to the contribution identified above is transferred to QJPS The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form, or any other reproductions of similar nature. The Author may publish his/her contribution on his/her personal Web page provided that he/she creates a link to the above mentioned volume of QJPS . The Author may not publish his/her contribution anywhere else without the prior written permission of the publisher unless it has been changed substantially. The Author warrants that his/her contribution is original, except for such excerpts from copyrighted works as may be included with the permission of the copyright holder and author thereof, that it contains no libelous statements, and does not infringe on any copyright, trademark, patent, statutory right, or propriety right of others. The Author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.