Evolution of block symmetric cipher architectures

Authors

  • K.E. Lysytskyi Харківський національний університет імені В. Н. Каразіна, Ukraine https://orcid.org/0000-0002-7772-3376
  • I.V. Lysytska Харківський національний університет імені В. Н. Каразіна, Ukraine https://orcid.org/0000-0001-6758-9516
  • I.M. Galtseva Харківський національний університет імені В. Н. Каразіна, Ukraine
  • E.P. Kolovanova Харківський національний університет імені В. Н. Каразіна, Ukraine https://orcid.org/0000-0002-0326-2394

DOI:

https://doi.org/10.30837/rt.2025.4.223.03

Keywords:

сryptography, cryptanalysis, block symmetric ciphers, post-quantum cryptography, lightweight cryptography

Abstract

The article presents an analysis of the evolution and design principles of block symmetric ciphers (BSCs), which are a direct implementation of the fundamental ideas of Claude Shannon.

A detailed comparative analysis of two classical iterative architectures is carried out, namely, the Feistel Network (FN) and the Substitution-Permutation Network (SPN), which have become the basis for most modern standards (including DES and AES). The key differences in their reversibility, requirements for the round function and diffusion rate are considered. Additionally, alternative designs such as the Leigh-Massey (LM) Network and the Generalized Feistel (GFN) Network, ARX (Add-Rotate-XOR) ciphers are investigated, emphasizing their role in providing faster diffusion and flexibility.

Three main directions of modern adaptation of BSNs are highlighted:

Performance on powerful processors: dominance of ARX (Add-Rotate-XOR) designs that replace traditional S-blocks with operations efficient for 32/64-bit architectures (e.g., ChaCha20);

Post-quantum stability: it is substantiated that BSNs such as AES-256 remain resistant to Grover's attack by doubling the key length;

Minimalism and Lightweight Cryptography: changing priorities to energy efficiency and minimizing hardware costs for IoT devices. This has led to the development of ciphers with very small S-blocks (like PRESENT), which compensate for the weaker round function by significantly increasing the number of rounds.

Thus, the article demonstrates that the architecture of BSS is a dynamic field that successfully evolves, effectively adapting to both theoretical threats (quantum computing) and hard practical hardware limitations.

References

Shannon C. E. A communication theory of secrecy systems // Bell System Technical Journal. 1949. Vol. 28, № 4. P. 656–715.

Feistel H. Cryptography and computer privacy // Scientific American. 1973. Vol. 228, № 5. P. 15–23.

Stallings W. Cryptography and Network Security: Principles and Practice (8th ed.). Pearson, 2023.

ISO/IEC 18033-3:2010. Information technology – Security techniques – Encryption algorithms. Part 3: Block ciphers. International Organization for Standardization, 2010.

Luby M., & Rackoff C. Pseudorandomness and Cryptographic Applications // Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing. ACM, 1988. P. 348–355.

Naor M., & Reingold O. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited // Journal of Cryptology. 1999. Vol. 12, № 1. P. 29–66.

NIST (National Institute of Standards and Technology). FIPS PUB 197: Advanced Encryption Standard (AES). Washington, D.C. : U.S. Department of Commerce, 2001.

Schneier B., & Whiting D. A performance comparison of the AES submissions // AES Conference Proceedings. NIST, 1999.

NESSIE Consortium. NESSIE Project Final Report. [Електронний ресурс]. 2003. URL: [Вставити офіцій-не посилання на звіт NESSIE].

Lai X., & Massey J. L. A Proposal for a New Block Encryption Standard. Advances in Cryptology–EUROCRYPT ’90. Springer, Berlin, Heidelberg, 1991. P. 389–404.

Preneel B. The International Data Encryption Algorithm (IDEA) // The Handbook of Security. Auerbach Publications, 2003.

Menezes A. J., van Oorschot P. C., & Vanstone S. A. Handbook of Applied Cryptography. Boca Raton : CRC Press, 1997. P. 250–252.

Schneier B., Mook D., & Mook J. The CAST-256 algorithm. Software for Data Security, 1999.

Bernstein D. J. ChaCha, a variant of Salsa20. Advances in Cryptology – SAC 2008. Springer, 2008. P. 138–170.

Matsui M. New block encryption algorithm MISTY. Fast Software Encryption – FSE ’97. Springer, 1997. P. 54–68.

3GPP TS 35.202. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: KASUMI specification. 2004.

Grover L. K. A fast quantum mechanical algorithm for database search // Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. 1996. P. 212–219.

NIST SP 800-57 Part 1 Rev. 5. Recommendation for Key Management: Part 1 – General. NIST, 2020.

Bernstein D. J., & Lange T. Post-quantum cryptography // Nature. 2017. Vol. 549, № 7671. P. 188–194.

Andres C., Biryukov A., D'Haeseleer J., Indesteege S., & Leurent G. PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007. Springer, 2007. P. 450–464.

Bernstein D. J. ChaCha, a variant of Salsa20. Advances in Cryptology – SAC 2008. Springer, 2008. P. 138–170.

Eisenbarth T., Gong L., & Kniffler A. A Survey of Lightweight Cryptography Implementations on FPGAs // IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021.

Beaulieu S., Shors J., Smith J., Treatman-Clark S., Weeks B., & Wingers L. The SIMON and SPECK light-weight block ciphers // 4th Workshop on RFID Security, 2013.

Published

2025-12-24

How to Cite

Lysytskyi, K., Lysytska, I., Galtseva, I., & Kolovanova, E. (2025). Evolution of block symmetric cipher architectures. Radiotekhnika, (223), 31–37. https://doi.org/10.30837/rt.2025.4.223.03

Issue

Section

Articles