Evolution of block symmetric cipher architectures
DOI:
https://doi.org/10.30837/rt.2025.4.223.03Keywords:
сryptography, cryptanalysis, block symmetric ciphers, post-quantum cryptography, lightweight cryptographyAbstract
The article presents an analysis of the evolution and design principles of block symmetric ciphers (BSCs), which are a direct implementation of the fundamental ideas of Claude Shannon.
A detailed comparative analysis of two classical iterative architectures is carried out, namely, the Feistel Network (FN) and the Substitution-Permutation Network (SPN), which have become the basis for most modern standards (including DES and AES). The key differences in their reversibility, requirements for the round function and diffusion rate are considered. Additionally, alternative designs such as the Leigh-Massey (LM) Network and the Generalized Feistel (GFN) Network, ARX (Add-Rotate-XOR) ciphers are investigated, emphasizing their role in providing faster diffusion and flexibility.
Three main directions of modern adaptation of BSNs are highlighted:
Performance on powerful processors: dominance of ARX (Add-Rotate-XOR) designs that replace traditional S-blocks with operations efficient for 32/64-bit architectures (e.g., ChaCha20);
Post-quantum stability: it is substantiated that BSNs such as AES-256 remain resistant to Grover's attack by doubling the key length;
Minimalism and Lightweight Cryptography: changing priorities to energy efficiency and minimizing hardware costs for IoT devices. This has led to the development of ciphers with very small S-blocks (like PRESENT), which compensate for the weaker round function by significantly increasing the number of rounds.
Thus, the article demonstrates that the architecture of BSS is a dynamic field that successfully evolves, effectively adapting to both theoretical threats (quantum computing) and hard practical hardware limitations.
References
Shannon C. E. A communication theory of secrecy systems // Bell System Technical Journal. 1949. Vol. 28, № 4. P. 656–715.
Feistel H. Cryptography and computer privacy // Scientific American. 1973. Vol. 228, № 5. P. 15–23.
Stallings W. Cryptography and Network Security: Principles and Practice (8th ed.). Pearson, 2023.
ISO/IEC 18033-3:2010. Information technology – Security techniques – Encryption algorithms. Part 3: Block ciphers. International Organization for Standardization, 2010.
Luby M., & Rackoff C. Pseudorandomness and Cryptographic Applications // Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing. ACM, 1988. P. 348–355.
Naor M., & Reingold O. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited // Journal of Cryptology. 1999. Vol. 12, № 1. P. 29–66.
NIST (National Institute of Standards and Technology). FIPS PUB 197: Advanced Encryption Standard (AES). Washington, D.C. : U.S. Department of Commerce, 2001.
Schneier B., & Whiting D. A performance comparison of the AES submissions // AES Conference Proceedings. NIST, 1999.
NESSIE Consortium. NESSIE Project Final Report. [Електронний ресурс]. 2003. URL: [Вставити офіцій-не посилання на звіт NESSIE].
Lai X., & Massey J. L. A Proposal for a New Block Encryption Standard. Advances in Cryptology–EUROCRYPT ’90. Springer, Berlin, Heidelberg, 1991. P. 389–404.
Preneel B. The International Data Encryption Algorithm (IDEA) // The Handbook of Security. Auerbach Publications, 2003.
Menezes A. J., van Oorschot P. C., & Vanstone S. A. Handbook of Applied Cryptography. Boca Raton : CRC Press, 1997. P. 250–252.
Schneier B., Mook D., & Mook J. The CAST-256 algorithm. Software for Data Security, 1999.
Bernstein D. J. ChaCha, a variant of Salsa20. Advances in Cryptology – SAC 2008. Springer, 2008. P. 138–170.
Matsui M. New block encryption algorithm MISTY. Fast Software Encryption – FSE ’97. Springer, 1997. P. 54–68.
3GPP TS 35.202. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: KASUMI specification. 2004.
Grover L. K. A fast quantum mechanical algorithm for database search // Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. 1996. P. 212–219.
NIST SP 800-57 Part 1 Rev. 5. Recommendation for Key Management: Part 1 – General. NIST, 2020.
Bernstein D. J., & Lange T. Post-quantum cryptography // Nature. 2017. Vol. 549, № 7671. P. 188–194.
Andres C., Biryukov A., D'Haeseleer J., Indesteege S., & Leurent G. PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007. Springer, 2007. P. 450–464.
Bernstein D. J. ChaCha, a variant of Salsa20. Advances in Cryptology – SAC 2008. Springer, 2008. P. 138–170.
Eisenbarth T., Gong L., & Kniffler A. A Survey of Lightweight Cryptography Implementations on FPGAs // IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021.
Beaulieu S., Shors J., Smith J., Treatman-Clark S., Weeks B., & Wingers L. The SIMON and SPECK light-weight block ciphers // 4th Workshop on RFID Security, 2013.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).


