2026, issue 1, p. 94-107
Received 23.10.2025; Revised 31.01.2026; Accepted 03.03.2026
Published 27.03.2026; First Online 31.03.2026
https://doi.org/10.34229/2707-451X.26.1.8
Previous | FULL TEXT (PDF in Ukrainian) | Next
Open Access under CC BY-NC 4.0 License
Cryptographic Complexity Analysis and Testing of the Symmetric Block Algorithm WBC2
V.M. Glushkov Institute of Cybernetics of the NAS of Ukraine, Kyiv
Correspondence: This email address is being protected from spambots. You need JavaScript enabled to view it.
Introduction. Modern developments in the field of block-oriented algorithms are aimed at improving performance, reducing computational costs, and integrating such algorithms into quantum-resistant national standards. To enhance the security of the WBC1 algorithm, this paper proposes its modification – the WBC2 algorithm – which is a modern symmetric block cipher that extends the WBC1 model to a more robust, nonlinear, and flexible structure. WBC2 is an interesting example of a cryptographic model with a visual representation (the Rubik’s Cube), which enables the creation of unique key-dependent operations. The paper presents a detailed description of the encryption process, an analysis of the algorithm’s complexity and execution speed, and the results of its testing.
The purpose. The aim of this work is to describe a new symmetric block cryptographic algorithm, WBC2, to investigate its computational complexity and execution speed, and to conduct its testing.
Results. An improved symmetric block cryptographic algorithm, WBC2, has been developed. The complexity analysis and execution speed of the algorithm have been investigated. The applicability of the new algorithm is demonstrated through illustrative examples.
Conclusions. The WBC2 algorithm represents a cryptographically secure encryption method that provides a high level of security through the use of complex dynamic permutations, cyclic shifts, round transformations, extended S-boxes, and diffusion procedures. The increase in processing time in WBC2 is the cost of additional cryptographic complexity and an enhanced avalanche effect. One of the directions for improving the efficiency of the algorithm is the use of parallel computations, which significantly reduces execution time without compromising security. Further research is aimed at developing a parallel modification, PWBC2, and a quantum version, WBCQ, which employs parameterized quantum mixing (PQM) to increase key dynamism and the nonlinearity of transformations.
Keywords: symmetric block cryptographic algorithm, complexity analysis of symmetric block ciphers, performance analysis of cryptographic algorithms, S-box, diffusion, round key, NIST Statistical Test Suite.
Cite as: Baranov I. Cryptographic Complexity Analysis and Testing of the Symmetric Block Algorithm WBC2. Cybernetics and Computer Technologies. 2026. 1. P. 94–107. (in Ukrainian) https://doi.org/10.34229/2707-451X.26.1.8
References
1. Zadiraka V.К. Modern methods of solving information security problems. Visnyk NAN Ukrainy. 2014. 5. P. 65–69. (in Ukraine)
2. Zadiraka V., Kudin A., Shvidchenko I., Bredelev B. Cryptographic and steganographic protocols for cloud systems. Computer technologies in information security. Ternopil: “Kart-blansh”, 2015. Р. 9–41.
3. Zadiraka V., Yakymenko I., Kasianchuk M., Ivasyev S. Theoretical and numerical Krestenson’s basis and its application to problems of cryptographic protection and factorization of multidigit numbers. Computer technologies in information security. Ternopil: “Kart-blansh”, 2015. Р. 216–260. https://doi.org/10.1109/CADSM.2015.7230841
4. Zadiraka V., Smolarz A. Improving performance of two-key cryptography systems. Computer technologies for information security. Lublin: Politechnika Lubelska, 2011. Р. 90–119.
5. Kudin А.М. Blockchain and crypto currency on the basis of "proof of accuracy”. Mathematical and computer modeling. Technical sciences. 2017. 15. P. 104–108. (in Russian)
6. Zadiraka V.K., Kudin А.М. Cloud computing in cryptography and steganography. Cybernetics and system analysis. 2013. 49 (4). P. 584–588. https://doi.org/10.1007/s10559-013-9544-x
7. Kudin А.М. Cryptographic transformations of non-Shannon sources of information. Cybernetics and system analysis. 2010. 46 (5). P. 813–819. https://doi.org/10.1007/s10559-010-9263-5
8. Gorbenko I.D., Dolhov V.I., Oleinikov R.V. et al. The Prospective Symmetric Block Cipher “Kalyna”: Basic Principles and Specifications. Applied Radio Electronics. 2007. Vol. 6, No. 2. P. 195–208. (in Ukrainian)
9. Kuznetsov А.А., Іvanenko D.V., Kolovanova E.P. Perspective block cipher «Kalyna» modelling. Applied Radio Electronics. 2014. Vol. 13, No 3. P. 201–207.
10. Gorbenko I., Kuznetsov A., Lutsenko M. and Ivanenko D. The research of modern stream ciphers. 4th International Scientific-Practical Conference Problems of Infocommu-nications. Kharkiv : Science and Technology (PIC S&T). 2017. P. 207–210. https://doi.org/10.1109/INFOCOMMST.2017.8246381
11. DSTU 7624:2014. Information Technology. Cryptographic Protection of Information. Symmetric Block Transformation Algorithm. [Text]. Effective from July 1, 2015. Kyiv: Ministry of Economic Development of Ukraine, 2015. (in Ukrainian)
12. DSTU 7564:2014. Information Technology. Cryptographic Protection of Information. Hash Function. (in Ukrainian) https://usts.kiev.ua/wp-content/uploads/2020/07/dstu-7564-2014.pdf (accessed: 23.10.2025)
13. DSTU 8845:2019. Information Technology. Cryptographic Protection of Information. Symmetric Stream Transformation Algorithm. (in Ukrainian) https://nure.ua/wp-content/uploads/2020/Konkurs/dstu.pdf (accessed: 23.10.2025)
14. DSTU 8961:2019. Information Technology. Cryptographic Protection of Information. Asymmetric Encryption and Key Encapsulation Algorithms. (in Ukrainian) http://online.budstandart.com/ua/catalog/doc-page.html?id_doc=88056 (accessed: 23.10.2025)
15. DSTU ISO/IEC 18033-3:2015 (ISO/IEC 18033-3:2010, IDT). Information Technology. Security Techniques. Encryption Algorithms. Part 3. Block Ciphers. (in Ukrainian)
16. DSTU ISO/IEC 10116:2019 (ISO/IEC 10116:2017, IDT). Information Technology. Security Techniques. Modes of Operation for n-bit Block Ciphers. (in Ukrainian)
17. National Institute of Standards and Technology. NIST Special Publication 800-67: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. January 2012. http://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf
18. National Institute of Standards and Technology, “FIPS-197: Advanced Encryption Standard”, November 2001. Available at: http://csrc.nist.gov/publications/ fips/fips197/fips-197.pdf/
19. Matsui M. et al. A Description of the Camellia Encryption Algorithm, Internet Engineering Task Force, Request for Comment 3713, April 2004. http://www.ietf.org/rfc/rfc3713.txt 5
20. Gorbenko I. et al. The Kalyna Symmetric Block Cipher – the New National Standard of Ukraine. Radiotekhnika. 2015. Iss. 181. P. 5–22. (in Ukrainian) http://nbuv.gov.ua/UJRN/rvmnts_2015_181_3
21. Kuznetsov O.O., Frolenko V.O., Yeromin E.S., Ivanenko D.V. Research of cross-platform implementations of stream symmetric ciphers. Radioengineering. 2014. No.193. P. 94–106. https://doi.org/10.30837/rt.2018.2.193.10
22. ISO/IEC 10116:2006. Available at: https://www.iso.org/standard/38761.html (accessed: 23.10.2025)
23. ISO/IEC 10116:2017. Available at: https://www.iso.org/standard/64575.html (accessed: 23.10.2025)
24. NIST Statistical Test Suite: https://csrc.nist.gov/Projects/Random-Bit-Generation/Documentation-and-Software (accessed: 23.10.2025)
25. Baranov I. Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity. Cybernetics and Computer Technologies. 2025. 1. P. 64–73. (in Ukrainian) https://doi.org/10.34229/2707-451X.25.1.6
26. Biham E., Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag. 1993. 188 p. https://doi.org/10.1007/978-1-4613-9314-6
27. Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley. 1996. 758 p.
28. Diffie W., Hellman M.E. New Directions in Cryptography. IEEE Transactions on Information Theory. 1976. 22 (6). P. 644–654. https://doi.org/10.1109/TIT.1976.1055608
29. Biham E. New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (eds) Advances in Cryptology – EUROCRYPT ’93. EUROCRYPT 1993. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 1994. Vol. 765. P. 398–409. https://doi.org/10.1007/3-540-48285-7_34
30. Biham E., Shamir A. Differential Cryptanalysis of DES-like Cryptosystems. Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 1991. Vol 537. P. 2–11. https://doi.org/10.1007/3-540-38424-3_1
31. Matsui M. Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (eds) Advances in Cryptology – EUROCRYPT ’93. EUROCRYPT 1993. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 1994. Vol. 765. P. 386–397. https://doi.org/10.1007/3-540-48285-7_33
32. Matsui M.The First Experimental Cryptanalysis of the Data Encryption Standard. In Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '94). Springer-Verlag, Berlin, Heidelberg. 1994. P. 1–11. https://doi.org/10.1007/3-540-48658-5_1
33. Nyberg K. Linear Approximation of Block Ciphers. Advances in Cryptology – EUROCRYPT ’94. Ed. by Alfredo De Santis. Lecture Notes in Computer Science. Springer, 1995. 950. P. 439–444. https://doi.org/10.1007/BFb0053460
34. Kocher P.C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz N. (eds) Advances in Cryptology – CRYPTO ’96. CRYPTO 1996. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 1996. Vol 1109. https://doi.org/10.1007/3-540-68697-5_9
35. Kocher P., Jaffe J., Jun B. Differential Power Analysis. In: Wiener M. Advances in Cryptology – CRYPTO’ 99. CRYPTO 1999. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 1999. Vol. 1666. P. 388–397. https://doi.org/10.1007/3-540-48405-1_25
36. Brumley D., Boneh D. Remote timing attacks are practical. Computer Networks. 2005. 48 (5). P. 701–716. https://doi.org/10.1016/j.comnet.2005.01.010
37. Baranov I.A., Khimich O.M., Nikolaievska O.A. Certificate of Registration of Copyright for a Work issued by the State Service of Intellectual Property of Ukraine: Computer Program “Rubikrypt Software Suite for Data Encryption and Decryption Based on the Symmetric Block Cryptographic Algorithms WBC1 and WBC2”. No.141653; published January 15, 2026. (in Ukrainian)
ISSN 2707-451X (Online)
ISSN 2707-4501 (Print)
Previous | FULL TEXT (PDF in Ukrainian) | Next