TRENDS IN INCREASING THE CRYPTO-STRENGTH OF SYMMETRIC BLOCK CIVERS IN THE CONTEXT OF THE MODERN CRYPTOSYSTEMS DEVELOPMENT
Keywords:
Symmetric Encryption, Block Ciphers, Feistel Network, S-DES, S-Boxes, Cryptographic Strength, AES, Lightweight Ciphers, IoT, SOG-ISAbstract
The article examines the combination of analytical and applied approaches to improving symmetric block ciphers in light of current trends in the development of cryptographic systems. The study analyzes the current SOG-IS standards and recommendations that define the basic directions of symmetric algorithm evolution, such as the transition from outdated Feistel-based schemes to optimized structures (AES, lightweight block ciphers for IoT). Using a modified version of the Simple-DES (S-DES) cipher, the paper proposes a method for enhancing cryptographic strength without changing the key or block length. The main improvements involve an enhanced design of S-boxes and their dynamic selection based on a key graph. The results of the comparative analysis demonstrate a significant increase in resistance to brute-force and differential cryptanalysis compared to the standard S-DES, while maintaining low computational complexity. The conducted research confirms the relevance of using educational and experimental models such as S-DES to explore modern methods for improving the security of symmetric ciphers, which is of practical importance for prototyping and lightweight implementations in Internet of Things systems.
References
1. Stallings, W. (2014). Cryptography and network security: Principles and practice (6th ed.). Pearson Education. URL: https://www.uoitc.edu.iq/images/documents/informatics-institute/Competitive_exam/Cryptography_and_Network_Security.pdf.
2. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., & Hall, C. (1998). On the Twofish key schedule. In Selected Areas in Cryptography (pp. 27–42). Springer. https://doi.org/10.1007/3-540-48892-8_3.
3. Schneier, B. (1998). Cryptographic design vulnerabilities. Computer, 31(9), 29–33. https://doi.org/10.1109/2.708447.
4. Blaze, M., & Schneier, B. (1995). The MacGuffin block cipher algorithm. In B. Preneel (Ed.), Fast Software Encryption: FSE '94 (pp. 97–110). Springer. https://doi.org/10.1007/3-540-60590-8_8.
5. Daemen, J., & Rijmen, V. (2020). The design of Rijndael: The Advanced Encryption Standard (AES) (2nd ed.). Springer. https://doi.org/10.1007/978-3-662-60769-5.
6. Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., & Mori, K. (2015). Midori: A block cipher for low energy. In Advances in Cryptology – ASIACRYPT 2015 (pp. 411–436). Springer. https://doi.org/10.1007/978-3-662-48800-3_17.
7. Al-Nofaie, S. M., Sharaf, S., & Molla, R. (2025). Design trends and comparative analysis of lightweight block ciphers for IoTs. Applied Sciences, 15(14), 7740. https://doi.org/10.3390/app15147740.
8. Knudsen, L. R. (1994). Block ciphers: Analysis, design and applications (DAIMI Report Series No. 23/485). University of Aarhus. https://doi.org/10.7146/dpb.v23i485.6978.
9. Luzhetskyi, V. A., & Ostapenko, A. V. (2013). Analiz alhorytmiv symetrychnoho blokovoho shyfruvannia [Analysis of symmetric block cipher algorithms]. ITKI, 25(3).
10. Kuznetsov, O. O., Oliinykov, R. V., Horbenko, Yu. I., Pushkarov, A. I., Dyrda, O. V., & Horbenko, I. D. (2014). Obgruntuvannia vymoh, pobuduvannia ta analiz perspektyvnykh symetrychnykh kryptoperetvoren na osnovi blochnykh shyfriv [Substantiation of requirements, construction and analysis of перспективних symmetric cryptographic transformations based on block ciphers]. Visnyk Natsionalnoho universytetu “Lvivska politekhnika”, 124–141.https://science.lpnu.ua/sites/default/files/journal-paper/2017/nov/6634/21-124-141.pdf.
11. Hryshchuk, R., & Hryshchuk, O. (2025). Otsiniuvannia kryptostiikosti kryptosystemy Fredholma: metodolohiia ta analiz rezultativ [Evaluation of the cryptographic strength of the Fredholm cryptosystem: Methodology and analysis of results]. Kiberbezpeka: osvita, nauka, tekhnika, 1(29), 748–761. https://doi.org/10.28925/2663-4023.2025.29.935.
12. Jiang, X., Lakhno, V., Sahun, A., & Mamchenko, S. (2024). Development of a symmetric cryptographic differential distinguisher based on deep learning. Cybersecurity: Education, Science, Technique, 2(26), 123–139. https://doi.org/10.28925/2663-4023.2024.26.674.
13. Gargiulo, J. (2002, July 25). S-Box modifications and their effect in DES-like encryption systems (GSEC v1.4, Option 1). GIAC. https://www.giac.org/paper/gsec/2048/s-box-modifications-effect-des-like-encryption-systems/103534.
14. Shawky, N., Ahmed, I., & Ibrahim, A. (2023). S-box modification for the block cipher algorithms. Przegląd Elektrotechniczny, 99(4), 47–50. https://doi.org/10.15199/48.2023.04.48.
15. Ministerstvo ekonomichnoho rozvytku i torhivli Ukrainy. (2009). DSTU GOST 28147:2009. Systema obrobky informatsii. Zakhyst kryptohrafichnyi. Alhorytm kryptohrafichnoho peretvorennia (GOST 28147-89). Kyiv: DP «UkrNDNTs». https://online.budstandart.com/ua/
catalog/doc-page.html?id_doc=55943.
16. Ministerstvo ekonomichnoho rozvytku i torhivli Ukrainy. (2014). DSTU 7624:2014. Informatsiini tekhnolohii. Kryptohrafichnyi zakhyst informatsii. Alhorytm symetrychnoho blokovoho peretvorennia. Kyiv: DP «UkrNDNTs», 2014. https://online.budstandart.com/
ua/catalog/doc-page?id_doc=65314.
17. National Institute of Standards and Technology. (2001). Advanced Encryption Standard (AES) (NIST FIPS 197). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.197. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901427 (Accessed December 4, 2025).
18. SOG-IS Crypto Working Group. (2023). SOGIS agreed cryptographic mechanisms (Version 1.3). SOG-IS. https://www.sogis.eu/documents/cc/crypto/SOGIS-Agreed-Cryptographic-Mechanisms-1.3.pdf.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Information technologies in economics and environmental sciences

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.