Design and Implementation of an Encryption Algorithm Based on GF(5m) in Information Security
Main Article Content
Abstract
The rapid development of information technology presents serious challenges in maintaining data confidentiality, authenticity, and integrity. Modern cryptography heavily relies on abstract algebraic structures, particularly finite fields or Galois Fields (GF), as the foundation for designing encryption algorithms. Most popular algorithms, such as AES, use GF(2^m) due to its compatibility with binary representation. However, the utilization of non-binary bases, specifically GF(5^m), is relatively under-researched despite its potential to increase algebraic structure diversity and expand the key space. This article discusses the design and implementation of an encryption algorithm based on GF(5^m). The encryption process involves key generation from an irreducible polynomial, substitution via a non-linear S-Box, and diffusion through matrix multiplication in the GF(5^m) domain. Implementation was carried out using Python, with messages represented as polynomials. Test results show that this algorithm can produce ciphertext with a random symbol distribution, has relatively efficient computation time for short messages, and possesses a large key space, making it resistant to brute-force attacks. Furthermore, the non-linear property of the S-Box in GF(5^m) provides better resistance against linear and differential cryptanalysis compared to GF(2^m)-based approaches. However, further analysis is needed regarding computational optimization and resistance to advanced cryptanalytic attacks. Thus, encryption algorithms based on GF(5^m) offer a promising alternative for developing modern information security systems and open opportunities for further research on the use of non-binary finite fields for future cryptography.
Article Details
References
Paar, C., & Pelzl, J. (2019). *Understanding Cryptography: A Textbook for Students and Practitioners*. Springer.
Lidl, R., & Niederreiter, H. (2020). *Finite Fields*. Cambridge University Press.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (2018). *Handbook of Applied Cryptography*. CRC Press.
Koc, C. K. (2015). Open Problems in Efficient Elliptic Curve Cryptography. *Designs, Codes and Cryptography, 77*(2–3), 693–712.
Singh, S., & Garg, S. (2017). A Survey on Cryptography Algorithms. *International Journal of Advanced Research in Computer Science, 8*(3), 1–5.
Mitra, S., & Banerjee, S. (2019). Implementation of a Modified AES Algorithm Using Galois Field GF(p^m). *International Journal of Computer Applications, 178*(21), 10–15.
Al-Janabi, S., & Al-Shourbaji, I. (2016). A Survey of Cryptographic Approaches for Security in Internet of Things (IoT). *International Journal of Computer Applications, 144*(3), 1–8.
Paterson, K. G., & Watson, G. J. (2014). On the Security of Block Ciphers Based on Non-binary Galois Fields. *Journal of Mathematical Cryptology, 8*(1), 1–16.
Rezvani, M., & Susilo, W. (2017). Secure Data Aggregation in Wireless Sensor Networks Based on Galois Fields. *IEEE Transactions on Information Forensics and Security, 12*(6), 1381–1395.
Singh, K., & Sharma, M. (2021). Cryptographic Transformations Using Non-binary Fields: A Comparative Study. *International Journal of Information Security and Privacy, 15*(2), 45–59.