<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.2d1 20130915//EN" "http://jats.nlm.nih.gov/archiving/1.2d1/JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta id="journal-meta-1">
      <journal-title-group>
        <journal-title>The Academic Research Community Publication</journal-title>
      </journal-title-group>
      <publisher>
        <publisher-name>IEREK Press</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta id="article-meta-1">
      <title-group>
        <article-title id="at-309d6abf009d">Energy Efficient Encryption Algorithm for Low Resources Devices</article-title>
      </title-group>
      <contrib-group>
        <contrib id="c-608a28e4b1f1">
          <name id="n-28e68122604d">
            <surname>‏Aboshosha</surname>
            <given-names>Bassam.‎‏ ‏W.‎‏</given-names>
          </name>
          <xref id="x-b5b0df3655a4" rid="a-75df8e1e99e0" ref-type="aff">1</xref>
        </contrib>
        <contrib id="c-85aa73eb7df8">
          <name id="n-531b66a53700">
            <surname>Dessouky</surname>
            <given-names>Mohamed‏.‏‎ ‎M.</given-names>
          </name>
          <xref id="x-ffb9e3b1d7cc" rid="a-b7d77a68cd0e" ref-type="aff">2</xref>
        </contrib>
        <contrib id="c-532f88981f61">
          <name id="n-09181bba2d74">
            <surname>Elsayed</surname>
            <given-names>Ayman</given-names>
          </name>
          <xref id="x-48760b092450" rid="a-b7d77a68cd0e" ref-type="aff">2</xref>
        </contrib>
        <aff id="a-75df8e1e99e0">
          <institution>Computer Department, ‎Higher Institute of Engineering, Elshorouk Academy‎, Cairo, Egypt</institution>
        </aff>
        <aff id="a-b7d77a68cd0e">
          <institution>Faculty of Electronic Engineering, Menoufia University, Menofia, Egypt</institution>
        </aff>
      </contrib-group>
      <abstract id="abstract-2a89e56ce121">
        <title id="abstract-title-376f5fed8869">Abstract</title>
        <p id="paragraph-9871f2ac10df"> Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN). Distributed WSN consists of several spread nodes in a harsh area. Therefore, once network has been established sensors replacement is not a possible option before at least five years which called network lifetime. So, it is a necessity to develop specific energy aware algorithms that could save battery lifetime as much as possible. Security and Privacy are the vital elements which need to be addressed to hold up to the trust of users in WSN environment. Because the majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms cannot be implemented in the constrained devices used by these networks. Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a WSN with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment. Therefore, a Simple Lightweight Encryption Algorithm (SLEA) based on addition and subtraction operations and compact Substitution-boxes (S-boxes) is proposed for wireless networks due to its low energy consumption, simple hardware requirements and suitable level of security. In addition, the algorithm tries to overcome the limitations of both public- and symmetric-key protocols. It relies on a smart version of Feistel structure.</p>
      </abstract>
      <kwd-group id="kwd-group-1">
        <title>Keywords</title>
        <kwd>Wireless networks</kwd>
        <kwd>security</kwd>
        <kwd>privacy</kwd>
        <kwd>Wireless Sensor Networks(WSNs)</kwd>
        <kwd>cryptosystem</kwd>
        <kwd>SLEA</kwd>
        <kwd>Feistel structure</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec>
      <title id="t-9231bea8628e">Introduction</title>
      <p id="t-116a059a4464">Recently, Wireless network applications are widely spread in different fields due to the massive increase in the number of connected devices. Near to ten billion network devices are communicated together to accomplish different tasks. These devices serve about billions of users. Services offered can be used for different civil applications such as smart houses/buildings/cities, communications, entertainment, traffic monitoring, healthcare, and even in human bodies for patient monitoring, sharing knowledge, financial transactions, and many other purposes. Besides these applications, it also used for military purposes such as boundary observation, vechile movements monitoring, environment monitoring, torrerists following and arrested and so on. In addition to a more powerful node called aggregation or base station node can communicate with conventional devices (laptops, smart phones, etc.) locate nearly around (Atzori, Iera &amp; Morabito, 2010). </p>
      <p id="p-3e805ba71795">Wireless network environment is extremely open to attacks, for the reasons that wireless communications, the risk of interception is greater than with wired networks. If the message is not encrypted, or encrypted with a weak algorithm, the attacker can read it; there by it compromises confidentiality. In addition, due to the wireless communication medium, there is a physical attack threats on its devices as they often deployed unsupervised for long time (Gubbi, Buyya, Marusic &amp; Palaniswami, 2013; Want &amp; Dustdar, 2015). Selection of a suitable security scheme is critical in wireless networks because of the open media broadcasts messages with limited energy (Mariona, Hallman, Kline, Miguel, Major &amp; Kerr, 2016). To achieve the security requirements, several cryptographic algorithms have been proposed for server/desktop devices which are not compatable with wireless networks due to its constrained devices (Suo, Wan, Zou &amp; Liu, 2012; Ho, Leung, Mishra, Hosseini, Song &amp; Wagner, 2016). The implementation of such conventional encryption algorithms is not effective as they are decreasing the performance of the energy constrained devices and network lifetime. Therefore, the lightweight cryptographic algorithm is one of the most suitable solutions to safeguard against such kinds of attacks by ciphering the packets transmitted by wireless nodes Ho, Leung, Mishra, Hosseini, Song &amp; Wagner, 2016). Beside that, it is an energy efficient ciphers that minimize the energy consumption in both the encryption and decryption processes and achieves a suitable level of security Ho, Leung, Mishra, Hosseini, Song &amp; Wagner, 2016). This feature is the reason of saving the nodes power and increasing the overall network lifetime. Since the interest of this paper is to design an effective encryption algorithm suitable wired as well as wireless networks. It has been designed to meet the limited resources criteria including encryption and decryption consumed energy, program memory, temporary memory for runtime registers, execution time, encryption/ decryption key memory (Mariona, Hallman, Kline, Miguel, Major &amp; Kerr, 2016; Suo, Wan, Zou &amp; Liu, 2012).</p>
      <p id="p-6a9597ffbebd">A SLEA algorithm is proposed in this paper due to its ease implementation in both software and hardware. The SLEA algorithm has been designed to be a general purpose algorithm and to handle most of the limitations and constraints associated with other algorithms such as key size, speed, complexity, software and hardware implementations while focusing the attention on speed and complexity, power consumption has long been ignored. Dealing with power is, therefore, rapidly becoming one of the most important issues in encryption algorithms system design. This situation is aggravated by the selection of a suitable function with simple implementation, which achieves confusion and diffusion.   SLEA is designed to be secure energy-efficient algorithm in terms of its selected functions. This algorithm is mainly concerned with energy-efficient, high-throughput and computationally intensive technique with a suitable level of security. Although energy efficient and security in wireless networks have been studied in the literature, to the best of our knowledge this paper is the first study to introduce a new design encryption technique specified in wireless network without compromising network lifetime and wasting network resources.</p>
      <p id="p-a2f4ccfc19e7">The rest of the paper is organized as follows. Section 2 presents the related work, Section 3 introduces overview of SLEA, Section 3 describes the SLEA encryption, Section 4 presents the security consideration of SLEA, Section 5 describes SLEA implementation consideration, Section 6 presents SLEA analysis, Section 7 presents recommendations, and concluding remarks are made in Section 8.</p>
    </sec>
    <sec>
      <title id="t-66e0489a636e">Related work</title>
      <p id="p-bad0d2bb916e">In general terms, there are two types of key-based cryptogiphic algorithms: Symmetric and Asymmetric key cryptogiphic algorithms. Symmetric algorithms, which are the ones of interest in this paper, are these algorithms in which both encryption and decryption keys are identical. Symmetric algorithms can be further divided in two other categories which are stream and block ciphers. The first category includes the ones that operate on the plaintext a single bit at a time. The second category includes those algorithms which operate on the plaintext in groups of bits (usually 64, since this length is considered long enough to preclude analysis and small length to be workable). The latter category is the one of interest in this research.</p>
      <p id="p-159c1c2991e3">Many encryption systems were designed in the last two decades. These contributions can be classified into three groups: </p>
      <list list-type="bullet">
        <list-item id="li-2adfb1b381a6">
          <p><italic id="emphasis-1"><bold id="strong-1">Classical Class:</bold></italic><bold id="strong-2"> </bold> Conventional algorithms have been compared against each others and ranked according to its ability to be applicable in low resources devices applications, including Data Encryption Standard (DES) (National Bureau of Standards, U.S. Department of Commerce, 1977), Triple DES (TDES) (Stallings, 2009), International Data Encryption Algorithm (IDEA) (Lai &amp; Massey, 1990), Blowfish (Schneier, 1994), and AES (Rijndael, Daemen &amp; Rijmen, 1999; Nechvatal, Barker, Bassham, Burr, Dworkin, Foti &amp; Roback, 2001). The most widely used encryption scheme is DES in which it was adopted in 1977 by the National Bureau of Standards (National Bureau of Standards, U.S. Department of Commerce, 1977). The original DES was designed for hardware implementation and does not produce efficient software code. DES has two major weaknesses which are the relatively short key length of only 56 bits and it may not provide adequate security (Stallings, 2009). The second weakness is that the S-boxes that may have hidden trapdoors that causes highly successful cryptanalysis attack (Coppersmith, 1994; Biham &amp; Shamir, 1991). TDES is a trick to reuse DES implementations by cascading three instances of DES (with distinct keys). TDES is believed to be secure up to at least three times as DES (Stallings, 2009). However, it is slow, especially if it is implemented as a software to work along with computer applications. International Data Encryption Algorithm (IDEA) was created in its first form by Xuejia Lai and James Massey in 1990 (Lai &amp; Massey, 1990). In 1991, Lai and Massey strengthened the algorithm against differential cryptanalysis and called the result Improved Proposed Encryption Standard (IPES). The name of IPES was changed to IDEA in 1992. IDEA is designed to facilitate both software and hardware implementation. IDEA approach suffers from low speed and throughputs caused due to the modulo multiplication operations. The multiplication module is the most computational intensive module and it needs too much effort to design it efficiently. In each round of IDEA, four such modulo multipliers are needed. Therefore, the performance of IDEA in hardware i.e. the throughput rate and the area and cost efficiency depends on efficient design of the multiplier. Blowfish was designed by Bruce Schneier in 1993 (Schneier, 1994). It uses a variable key length and valid keys have between 32- and 448-bits. It was marketed as a replacement for DES and IDEA that could be immediately dropped-in. Blowfish can use huge keys and is believed secure, except with regards to its block size, which is 64 bits, just like DES and TDES. Blowfish is one of the fastest block ciphers in widespread use, except when changing keys. Each new key requires pre-processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers. This prevents its use in certain applications. Blowfish is efficient in software, at least on some software platforms (it uses key-dependent lookup tables; hence performance depends on how the platform handles memory and caches). Blowfish suffers from weak keys problem also. Finally, the Rijndael (Rijndael, Daemen &amp; Rijmen, 1999) proposal for Advanced Encryption Standard (AES) defined a cipher in which the block length and the key length can be independently specified to be 128,192, or 256 bits. The AES specification uses the same three key size alternatives but limits the block length to 128 bits. A number of AES parameters depend on the key length.</p>
        </list-item>
        <list-item id="li-f1d09f248df1">
          <p><italic id="emphasis-2"><bold id="strong-3">Adaptation Class:</bold></italic> Conventional algorithms have been modified to be suitable to wireless networks requirements. One example of these is Lightweight Data Encyption Standard (DESL). It is a smart version that mainly based on the classical DES algorithm (Leander, Paar, Poschmann &amp; Schramm, 2007). Unlike DES, DESL uses a single S-box instead of 8 S-boxes of DES (Bogdanov, Knudsen, Leander, Paar, Poschmann, Robshaw, Seurin &amp; Vikkelsoe, 2007). The design criteria of the single DESL S-box make DESL resistant to most common cryptanalytic attacks specially linear and differential attacks  (Leander, Paar, Poschmann &amp; Schramm, 2007). This allows saving a part of ROM for tables storage, more than 85% from memory space occupied by traditional DES has been saved. Another research team suggest to replace each   S-boxes by   in traditional algorithms that use such large boxes to save the memory space as well. The most famous algorithm that use S-boxes like these is AES. Finally, other researchers suggest to deal work with a reduction version of classsical algorithms by reducing number of round.</p>
        </list-item>
        <list-item id="li-28438085d805">
          <p><italic id="emphasis-3"><bold id="strong-4">Progressive Class:</bold></italic><italic id="emphasis-4"> </italic>Suggest new techniques suitable to limited resource devices. PRESENT (Silverlight, 2009) is one of the first lightweight block cipher designs that was proposed for low resourses devices. SIMON and SPECK (Beaulieu, Shors, Smith, Clark, Weeks, &amp; Wingers, 2013) are families of lightweight block ciphers that were designed to be simple, flexible, and perform well in hardware and software. There are also algorithms from the 1990s such as RC5 (Rivest, 1994), TEA (Wheeler &amp; Needham, 1994) and XTEA ((Wheeler &amp; Needham, 1994), which consist of simple round structures that make them suitable for constrained software environments.</p>
        </list-item>
      </list>
      <p id="paragraph-10">In this paper the proposed SLEA has been designed to mitigate some of the previous work limitations and constraints such as key size, block size, speed, lookup tables, S-boxes, P-boxes, complexity, software and hardware implementations. The main purpose of designing a new encryption algorithm is to be efficiently utilized in wireless networks. </p>
    </sec>
    <sec>
      <title id="t-a47fdf0dc899">Simple Encryption Algorithm (SLEA)</title>
      <p id="paragraph-12">This section introduces the concept behind SLEA. In general terms, symmetric algorithms, which are the ones of interest here, are those algorithms in which the encryption key can be calculated from the decryption key and vice versa while in most of them both (encryption and decryption) keys are identical. </p>
      <p id="paragraph-13">In fact, SLEA takes into consideration two important factors which are security and simplicity. SLEA accomplishes a suitable level of security by using two keys (inner and outer keys) beside achieving both confusion and diffusion concepts. Rigid S-boxes with high nonlinearity properties are used to fulfil confusion. A combination of operations beside the nature of the Feistel structure are used to diffuse the data. On the other hand, simplicity achieved in terms of the compact size of S-boxes as well as the used internal simple operations. </p>
      <p id="paragraph-14">SLEA are based on a new approach of Feistel structure. SLEA block cipher operates with n-bit plaintext and ciphertext blocks and is controlled by an 2n-bit key. The fundamental feature in the design of this algorithm is the use of operations from different algebraic groups over the set of all (n/2)-bit blocks which are: </p>
      <list list-type="bullet">
        <list-item id="li-5bb746271a08">
          <p>XOR, denoted as ⊕.</p>
        </list-item>
        <list-item id="li-924ab8487fbc">
          <p>Addition Modulo 2<sup id="s-c2ea6f8b33fb">n/2 </sup>, denoted by  ⊞.</p>
        </list-item>
        <list-item id="li-dfe8d1a0e29c">
          <p>Subtraction Modulo 2<sup id="s-b3d18679e5c2">n/2</sup>, denoted by  ⊟.</p>
        </list-item>
        <list-item id="li-e48cbce22525">
          <p> One's complement, denoted by ∼ . </p>
        </list-item>
      </list>
      <p id="paragraph-19">These operations are applied on a (n/2)-bit sub-blocks. The cipher structure was designed to be easily implemented in both software and hardware. In addition, SLEA consists of m rounds using 4m (n/2)-bit outer sub-keys that are generated from the 2n-bit key and m (n/2)-bit inner sub-keys that are generated also from the 2n-bit key. The Basic architecture of SLEA encryption algorithm is depicted in Fig.1. As can be seen in this figure, SLEA architecture is based on the new approach of Feistel structure. The input is divided into right and left elements that go through number of rounds along with the generated sub-keys. The input could be n-bits as well as the key size is 2n-bits. The decryption structure is the same as the encryption with the reverse of the used keys.</p>
      <sec>
        <title id="t-e68f36d25ef4"> <bold id="strong-5">Single Round Processing</bold></title>
        <p id="paragraph-22">More detailed architecture of SLEA can be obtained by investigating the internal structure of a single round. First, the n-bit input is divided into two equal halves (n/2) denoted as Li and Ri, respectively. The overall processing at each round can be summarized by equations (1) and (2) where the left half of the input L<sub id="s-e7a7f2c89c2b">i-1</sub> and the outer sub-key K<sub id="s-0856055dd7cb">i+2</sub> are manipulated using subtraction binary operation. The output of the subtraction operation is complemented then Xored with function of the right half and both the inner and outer sub-keys S(R<sub id="s-7cdf14bf3efc">i-1</sub>, K<sub id="subscript-2">i</sub>, Key<sub id="subscript-3">i</sub>). Finally, the overall output is added to the outer sub-key  K<sub id="s-2ed8c28ad154">i+3 </sub>became the right half input of the next round.The right half of the input   R<sub id="s-c0067eeb1a23">i-1 </sub>and the sub-key  K<sub id="s-76d85400a9e2">i</sub> are manipulated using addition binary operation. The output of the addition operation and the sub-key K<sub id="s-980a454dede0">i+1</sub> are manipulated using subtraction binary operation became the left half input of the next round.</p>
        <fig id="f-a8747a9d032b" orientation="potrait" width="twocolumn" fig-type="graphic" position="anchor">
          <graphic id="g-b5e4f10354f0" xlink:href="https://typeset-prod-media-server.s3.amazonaws.com/article_uploads/dd6b9c49-31a2-4959-ad6e-0a17226f3bcd/image/b03466fc-6579-41d1-a8d5-55ebc5ac0fcc-ufig1.png"/>
          <label>Figure 1 </label>
          <caption id="c-adbca2d591dc">
            <title id="t-9000e44e3d89">Feistel structure of SLEA</title>
          </caption>
        </fig>
        <p id="p-bd6d6bde5e23"/>
        <disp-formula>
          <label>1</label>
          <math xmlns="http://www.w3.org/1998/Math/MathML">
            <msub>
              <mi>L</mi>
              <mi>i</mi>
            </msub>
            <mo>=</mo>
            <mo> </mo>
            <mo>(</mo>
            <msub>
              <mi>R</mi>
              <mrow>
                <mi>i</mi>
                <mo>-</mo>
                <mn>1</mn>
              </mrow>
            </msub>
            <mo>⊞</mo>
            <msub>
              <mi>K</mi>
              <mi>i</mi>
            </msub>
            <mo>)</mo>
            <mo>⊟</mo>
            <msub>
              <mi>K</mi>
              <mrow>
                <mi>i</mi>
                <mo>+</mo>
                <mn>1</mn>
              </mrow>
            </msub>
          </math>
        </disp-formula>
        <disp-formula>
          <label>2</label>
          <math xmlns="http://www.w3.org/1998/Math/MathML">
            <msub>
              <mi>R</mi>
              <mi>i</mi>
            </msub>
            <mo>=</mo>
            <mo>[</mo>
            <mo>(</mo>
            <msub>
              <mi>L</mi>
              <mrow>
                <mi>i</mi>
                <mo>-</mo>
                <mn>1</mn>
              </mrow>
            </msub>
            <mo>⊟</mo>
            <msub>
              <mi>K</mi>
              <mrow>
                <mi>i</mi>
                <mo>+</mo>
                <mn>2</mn>
              </mrow>
            </msub>
            <mo>)</mo>
            <mo>⊕</mo>
            <mi>S</mi>
            <mo>(</mo>
            <mi>K</mi>
            <mi>e</mi>
            <msub>
              <mi>y</mi>
              <mi>i</mi>
            </msub>
            <mo>⊕</mo>
            <msub>
              <mi>R</mi>
              <mrow>
                <mi>i</mi>
                <mo>-</mo>
                <mn>1</mn>
              </mrow>
            </msub>
            <mo>⊞</mo>
            <msub>
              <mi>K</mi>
              <mi>i</mi>
            </msub>
            <mo>)</mo>
            <mo>]</mo>
            <mo>⊞</mo>
            <msub>
              <mi>K</mi>
              <mrow>
                <mi>i</mi>
                <mo>+</mo>
                <mn>3</mn>
              </mrow>
            </msub>
            <mo> </mo>
            <mo> </mo>
            <mo> </mo>
          </math>
        </disp-formula>
      </sec>
      <sec>
        <title id="t-fee71c056d7e">
          <bold id="s-d2616c1f8607">Key Generation</bold>
          <bold id="s-2c45fc75868f"> </bold>
        </title>
        <p id="p-cd0cc2ef1fd3">As shown in Fig. 2, for 16 rounds and block of 64 bits, it is required 64 (32-bits) outer sub-keys which are generated from the 128-bits encryption key. The scheme for generation is as follows. The first four sub-keys, labeled K1,K2,…..,K4 are taken directly from the key, with K1 being equal to the first (most significant) 32-bits, K2 corresponding to the next 32-bits, and therefore on. Then, a circular left shift of 19-bits positions is applied to the key, and the next four sub-keys are extracted. This procedure is repeated until all 64 outer sub-keys are generated. In addition, a 16 (32-bits) inner sub-keys are generated from another the 128-bits encryption key by the same way the only difference that the circular left shift of 13-bits positions is applied to the key. Then the total key length is 256-bits. Selection of shift value has been chosen to avoid repetition of sub-keys. To ensure that each sub-key is unique the following condition has to be satisfied, greatest common divisor between the shifted value and the key length equal one, GCD (Shift Value, Key Length) = 1.</p>
        <p id="p-b7cf3ff0ff9a">
          <x/>
        </p>
        <fig id="f-a6c078c2b885" orientation="potrait" width="twocolumn" fig-type="graphic" position="anchor">
          <graphic id="g-940049c3c175" xlink:href="https://typeset-prod-media-server.s3.amazonaws.com/article_uploads/dd6b9c49-31a2-4959-ad6e-0a17226f3bcd/image/4ecb4389-7e7b-491e-afb9-92453b5daa15-ufig2.png"/>
          <label>Figure 2 </label>
          <caption id="c-2a96ff82f20e">
            <title id="t-7ab2463870a4">Key Generation Algorithm Diagram</title>
          </caption>
        </fig>
        <p id="p-bef1cda5a3ff"/>
      </sec>
      <sec>
        <title id="t-b373393ab4b6">
          <bold id="s-e1c9211e0071">Detailed SLEA Decryption Structure </bold>
        </title>
        <p id="p-2acb3a5748bb">Again, the beauty of the decryption process is to be the same as the encryption process. SLEA decryption is achieved by using the ciphertext as input to the same overall SLEA structure, but with a different selection of keys, the decryption sub-keys are derived from the encryption sub-keys where they are applied in reverse order. The reversing process for both encryption and decryption for any round i, can be seen in Fig. 3. As any symmetric encryption algorithm, the structure of the decryption round is similar as in encryption process. The left-hand side of this figure shows the encryption process using sub-keys (Ki, Ki+1, Ki+2, Ki+3) and keyi are produced by the left circular shift process. The output of the round consists of n-bits, which represent the coded message. On the other hand, the right-hand side of the Fig.3 shows the decryption process using sub-keys (Ki, Ki+1, Ki+2, Ki+3) and keyi are applied in reverse order. The output of the round consists of n-bits, which represent the original message. Similarly, it is simple to prove that the overall reverse processing at each round can be summarized by equations (3) and (4)</p>
        <fig id="f-e60f48c78c21" orientation="potrait" width="twocolumn" fig-type="graphic" position="anchor">
          <graphic id="g-4dccbb9ef614" xlink:href="https://typeset-prod-media-server.s3.amazonaws.com/article_uploads/dd6b9c49-31a2-4959-ad6e-0a17226f3bcd/image/1769a937-ec2d-4f64-9009-58b2dbfd232d-ufig3.png"/>
          <label>Figure 3 </label>
          <caption id="c-44aec2b35469">
            <title id="t-12e1cd16d319">The reversing process for both Encryption and Decryption Algorithm for any Round i</title>
          </caption>
        </fig>
        <p id="p-9edbcef6e519"/>
        <disp-formula>
          <label>3</label>
          <math xmlns="http://www.w3.org/1998/Math/MathML">
            <msub>
              <mi>R</mi>
              <mrow>
                <mi>i</mi>
                <mo>-</mo>
                <mn>1</mn>
              </mrow>
            </msub>
            <mo>=</mo>
            <mo> </mo>
            <mo>(</mo>
            <msub>
              <mi>L</mi>
              <mi>i</mi>
            </msub>
            <mo>⊞</mo>
            <msub>
              <mi>K</mi>
              <mrow>
                <mi>i</mi>
                <mo>+</mo>
                <mn>1</mn>
              </mrow>
            </msub>
            <mo>)</mo>
            <mo>⊟</mo>
            <msub>
              <mi>K</mi>
              <mi>i</mi>
            </msub>
          </math>
        </disp-formula>
        <disp-formula>
          <label>4</label>
          <math xmlns="http://www.w3.org/1998/Math/MathML">
            <msub>
              <mi>L</mi>
              <mrow>
                <mi>i</mi>
                <mo>-</mo>
                <mn>1</mn>
              </mrow>
            </msub>
            <mo>=</mo>
            <mo>[</mo>
            <mo>(</mo>
            <mover>
              <mrow>
                <msub>
                  <mi>R</mi>
                  <mi>i</mi>
                </msub>
                <mo>⊟</mo>
                <msub>
                  <mi>K</mi>
                  <mrow>
                    <mi>i</mi>
                    <mo>+</mo>
                    <mn>3</mn>
                  </mrow>
                </msub>
              </mrow>
              <mo>¯</mo>
            </mover>
            <mo> </mo>
            <mo>)</mo>
            <mo>⊕</mo>
            <mi>S</mi>
            <mo>(</mo>
            <mi>K</mi>
            <mi>e</mi>
            <msub>
              <mi>y</mi>
              <mi>i</mi>
            </msub>
            <mo>⊕</mo>
            <mo>(</mo>
            <msub>
              <mi>L</mi>
              <mi>i</mi>
            </msub>
            <mo>⊞</mo>
            <msub>
              <mi>K</mi>
              <mrow>
                <mi>i</mi>
                <mo>+</mo>
                <mn>1</mn>
              </mrow>
            </msub>
            <mo>)</mo>
            <mo>]</mo>
            <mo>⊞</mo>
            <msub>
              <mi>K</mi>
              <mrow>
                <mi>i</mi>
                <mo>+</mo>
                <mn>2</mn>
              </mrow>
            </msub>
          </math>
        </disp-formula>
      </sec>
    </sec>
    <sec>
      <title id="t-c9a276cd3821">Security considerations for the cipher </title>
      <p id="clipboard_property">National Institute of Standards and Technology (NIST) launched a lightweight cryptography project that was tasked with understanding more about the issues and developing a scheme for the standardization of lightweight cryptographic algorithms. This project provides an overview of the lightweight cryptography project at NIST, and describes plans for the standardization of lightweight cryptographic algorithms. In this paper, NIST recommendations have been taken in consideration.  </p>
      <sec>
        <title id="t-692e030f4b83">
          <bold id="s-3ae6b88d1d75">Substitution Boxes</bold>
        </title>
        <p id="p-6cd8726abc75">The S-boxes S1, S2, S3 and S4 are the only nonlinear components of the cipher. It has been recommended to replace the usage of   8×8 S-boxes by a smaller  4×4 for use in constrained environments where the occupied memory space of current NIST cryptographic standards is not acceptable. On the other hand, Biham and Shamir proved that DES could be broken if poor S-boxes were used. For the DES-like cryptosystems to be cryptographically strong, so must their S-boxes. In other word, the security of DES like cryptosystems depends heavily on the strength of the S-boxes used. Therefore, the choice of cryptographically strong S-boxes is an important concern in design of secure cryptosystems. S1, S2, S3and S4 are chosen to satisfy the following cryptographically strong properties, Balancing, completeness, avalanche criteria, Strict Avalanche Criterion (SAC), non-linearity and robustness (XOR table distribution, and Linear Approximation Table (LAT). <bold id="s-cdf73c04ae3c"/></p>
        <p id="p-91162507f762">The GOST block cipher is a Soviet and Russian government standard symmetric key block cipher which is the basis of most secure information systems in Russia (De Canni`ere, 2005). The GOST block cipher has several versions. In this section, both GOST 28147-89 encryption algorithm, also known as simply GOST, and the most recent version of the standard, GOST R 34.12-2015, specifies that it may be referred to as Magma approaches have been observed. The GOST block cipher uses eight 4×4  S-boxes. These S-boxes have been analyzed to select the most rigid and powerful S-boxes (Courtois &amp; Miształ, 2011; Courtois, 2012). On other words, sixteen S-boxes have been tested to select the most secure four S-boxes that exceed the security design criteria. Also, the criteria for selection of the S-boxes have been considered security against different types of cryptanalysis. Each box is used twice as shown in Fig. 1. Table 1 shows the selected S-boxes.</p>
        <list list-type="bullet">
          <list-item id="li-818f7427ec64">
            <p>
              <bold id="s-6831fa58b6da">Substitution Boxes (S1, S2, S3 and S4)</bold>
            </p>
          </list-item>
        </list>
        <table-wrap id="tw-dfc099a1056a" orientation="potrait" width="twocolumn" autobreak="true">
          <label>Table 1</label>
          <caption id="c-ed5692d929f4">
            <title id="t-5a9d9c78b074">The S-boxes of SLEA algorithm</title>
          </caption>
          <table id="table-1" rules="rows">
            <colgroup>
              <col width="7.29"/>
              <col width="4.05"/>
              <col width="4.13"/>
              <col width="5.01"/>
              <col width="4.040000000000001"/>
              <col width="4.069999999999999"/>
              <col width="4.04"/>
              <col width="5.640000000000001"/>
              <col width="5.17"/>
              <col width="5.83"/>
              <col width="4.520000000000001"/>
              <col width="4.75"/>
              <col width="4.51"/>
              <col width="4.23"/>
              <col width="6.9"/>
              <col width="7.290000000000001"/>
              <col width="18.53"/>
            </colgroup>
            <thead id="table-section-header-72a87924c710">
              <tr id="tr-80a3df45e959">
                <th id="tc-07d8fbfcf567" colspan="17" rules="bottom" align="left">S-boxes</th>
              </tr>
            </thead>
            <tbody id="table-section-1">
              <tr id="table-row-2">
                <td id="table-cell-2" rules="bottom" align="left">x</td>
                <td id="table-cell-3" rules="bottom" align="left">0</td>
                <td id="table-cell-4" rules="bottom" align="left">1</td>
                <td id="table-cell-5" rules="bottom" align="left">2</td>
                <td id="table-cell-6" rules="bottom" align="left">3</td>
                <td id="table-cell-7" rules="bottom" align="left">4</td>
                <td id="table-cell-8" rules="bottom" align="left">5</td>
                <td id="table-cell-9" rules="bottom" align="left">6</td>
                <td id="table-cell-10" rules="bottom" align="left">7</td>
                <td id="table-cell-11" rules="bottom" align="left">8</td>
                <td id="table-cell-12" rules="bottom" align="left">9</td>
                <td id="table-cell-13" rules="bottom" align="left">A</td>
                <td id="table-cell-14" rules="bottom" align="left">B</td>
                <td id="table-cell-15" rules="bottom" align="left">C</td>
                <td id="table-cell-16" rules="bottom" align="left">D</td>
                <td id="table-cell-17" rules="bottom" align="left">E</td>
                <td id="table-cell-18" rules="bottom" align="left">F</td>
              </tr>
              <tr id="table-row-3">
                <td id="table-cell-19" rules="bottom" align="left">S1(x)</td>
                <td id="table-cell-20" rules="bottom" align="left">B</td>
                <td id="table-cell-21" rules="bottom" align="left">3</td>
                <td id="table-cell-22" rules="bottom" align="left">5</td>
                <td id="table-cell-23" rules="bottom" align="left">8</td>
                <td id="table-cell-24" rules="bottom" align="left">2</td>
                <td id="table-cell-25" rules="bottom" align="left">F</td>
                <td id="table-cell-26" rules="bottom" align="left">A</td>
                <td id="table-cell-27" rules="bottom" align="left">D</td>
                <td id="table-cell-28" rules="bottom" align="left">E</td>
                <td id="table-cell-29" rules="bottom" align="left">1</td>
                <td id="table-cell-30" rules="bottom" align="left">7</td>
                <td id="table-cell-31" rules="bottom" align="left">4</td>
                <td id="table-cell-32" rules="bottom" align="left">C</td>
                <td id="table-cell-33" rules="bottom" align="left">9</td>
                <td id="table-cell-34" rules="bottom" align="left">6</td>
                <td id="table-cell-35" rules="bottom" align="left">0</td>
              </tr>
              <tr id="table-row-4">
                <td id="table-cell-36" rules="bottom" align="left">S2(x)</td>
                <td id="table-cell-37" rules="bottom" align="left">C</td>
                <td id="table-cell-38" rules="bottom" align="left">8</td>
                <td id="table-cell-39" rules="bottom" align="left">2</td>
                <td id="table-cell-40" rules="bottom" align="left">1</td>
                <td id="table-cell-41" rules="bottom" align="left">D</td>
                <td id="table-cell-42" rules="bottom" align="left">4</td>
                <td id="table-cell-43" rules="bottom" align="left">F</td>
                <td id="table-cell-44" rules="bottom" align="left">6</td>
                <td id="table-cell-45" rules="bottom" align="left">7</td>
                <td id="table-cell-46" rules="bottom" align="left">0</td>
                <td id="table-cell-47" rules="bottom" align="left">A</td>
                <td id="table-cell-48" rules="bottom" align="left">5</td>
                <td id="table-cell-49" rules="bottom" align="left">3</td>
                <td id="table-cell-50" rules="bottom" align="left">E</td>
                <td id="table-cell-51" rules="bottom" align="left">9</td>
                <td id="table-cell-52" rules="bottom" align="left">B</td>
              </tr>
              <tr id="table-row-5">
                <td id="table-cell-53" rules="bottom" align="left">S3(x)</td>
                <td id="table-cell-54" rules="bottom" align="left">5</td>
                <td id="table-cell-55" rules="bottom" align="left">D</td>
                <td id="table-cell-56" rules="bottom" align="left">F</td>
                <td id="table-cell-57" rules="bottom" align="left">6</td>
                <td id="table-cell-58" rules="bottom" align="left">9</td>
                <td id="table-cell-59" rules="bottom" align="left">2</td>
                <td id="table-cell-60" rules="bottom" align="left">C</td>
                <td id="table-cell-61" rules="bottom" align="left">A</td>
                <td id="table-cell-62" rules="bottom" align="left">B</td>
                <td id="table-cell-63" rules="bottom" align="left">7</td>
                <td id="table-cell-64" rules="bottom" align="left">8</td>
                <td id="table-cell-65" rules="bottom" align="left">1</td>
                <td id="table-cell-66" rules="bottom" align="left">4</td>
                <td id="table-cell-67" rules="bottom" align="left">3</td>
                <td id="table-cell-68" rules="bottom" align="left">E</td>
                <td id="table-cell-69" rules="bottom" align="left">0</td>
              </tr>
              <tr id="table-row-6">
                <td id="table-cell-70" rules="bottom" align="left">S4(x)</td>
                <td id="table-cell-71" rules="bottom" align="left">1</td>
                <td id="table-cell-72" rules="bottom" align="left">7</td>
                <td id="table-cell-73" rules="bottom" align="left">E</td>
                <td id="table-cell-74" rules="bottom" align="left">D</td>
                <td id="table-cell-75" rules="bottom" align="left">0</td>
                <td id="table-cell-76" rules="bottom" align="left">5</td>
                <td id="table-cell-77" rules="bottom" align="left">8</td>
                <td id="table-cell-78" rules="bottom" align="left">3</td>
                <td id="table-cell-79" rules="bottom" align="left">4</td>
                <td id="table-cell-80" rules="bottom" align="left">F</td>
                <td id="table-cell-81" rules="bottom" align="left">A</td>
                <td id="table-cell-82" rules="bottom" align="left">6</td>
                <td id="table-cell-83" rules="bottom" align="left">9</td>
                <td id="table-cell-84" rules="bottom" align="left">C</td>
                <td id="table-cell-85" rules="bottom" align="left">B</td>
                <td id="table-cell-86" rules="bottom" align="left">2</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <sec>
          <title id="t-bd7ce27a151c">
            <bold id="s-25a730208e15">Security design criteria of substitution boxes</bold>
          </title>
          <p id="p-11f8b707e382">In cryptographic algorithms especially S-boxes, there are desirable properties which reflect the strength of the cryptographic transformation. These properties are stated as the following:</p>
          <list list-type="bullet">
            <list-item id="li-fbb3c69e0c9b">
              <p>
                <bold id="s-0658984bb720">Balancedness Property</bold>
              </p>
            </list-item>
          </list>
          <p id="p-f0a63e396dea">Each of the Boolean functions of the S-box should be balanced, i.e., the number of zeros and ones in the truth table of the Boolean function must be equal.</p>
          <list list-type="bullet">
            <list-item id="li-53a356e2f5da">
              <p><bold id="s-52480656b699">Completeness </bold><bold id="s-436216ed6568">Criterion</bold><bold id="strong-6"> </bold> </p>
            </list-item>
          </list>
          <p id="p-b192cc4aff70">For a Given one-one function f∶ {0,1}n --&gt; {0,1}n, f is said to be complete if, for every ‎i,j ∈ {1,… ,n}, there exist two n-bits vectors X1, X2 such that X1 and X2 differ only in the ith bit ‎and f(X1) differs from f(X2) at least in the jbit. In other words, if the input changes ‎slightly (flipping a single bit) the output has to be changed at least in a single bit (flipping a single bit). ‎Each output bit depends on all input bits this criteria is called completeness. </p>
          <list list-type="bullet">
            <list-item id="li-2ba22fd809e0">
              <p><bold id="strong-7">Avalanche </bold><bold id="strong-8">effect</bold> </p>
            </list-item>
          </list>
          <p id="paragraph-9">For instance, one of the most important characteristics of an S-box is an avalanche criterion that is a bit change in the input byte of an S-box must result in a change in the output byte at least by 50% of bits.</p>
          <list list-type="bullet">
            <list-item id="li-b622281011b9">
              <p><bold id="strong-9">Strict Avalanche Criterion</bold> </p>
            </list-item>
          </list>
          <p id="p-bdaab8143186">The concepts of completeness and the avalanche effect can be combined to define a new property which we shall call the strict avalanche criterion. If a cryptographic function is<italic id="e-c2e3a9fc06c6"> </italic> to satisfy the strict avalanche criterion, then each output bit should change with a probability of one half whenever a single input bit is complemented.</p>
          <p id="p-f77f4debe177">Table 2 shows the Strict Avalanche Criterion (SAC) of the best four S-boxes. It is important to notify that the S-box S5 of the Russian Central Bank Federation has a SAC value better than the following boxes. But, the selection took place related to the overall evaluation of each box separately; these boxes have better nonlinear properties than the Russian Central Bank Federation S-box S5. Therefore, S5 has been rejected. </p>
          <table-wrap id="tw-43e5370bca0d" orientation="potrait" width="twocolumn" autobreak="true">
            <label>Table 2</label>
            <caption id="c-13f988650399">
              <title id="t-c733f7cbf86f">The Strict Avalanche Criterion (SAC) of the SLEA S-boxes</title>
            </caption>
            <table id="t-4be8e8500077" rules="rows">
              <colgroup>
                <col width="11.03"/>
                <col width="9.26"/>
                <col width="9.34"/>
                <col width="10.370000000000001"/>
                <col width="10"/>
                <col width="10"/>
                <col width="10"/>
                <col width="10"/>
                <col width="10"/>
                <col width="10"/>
              </colgroup>
              <thead id="table-section-header-fc827aabf2c2">
                <tr id="tr-6c9158b8e853">
                  <th id="tc-ccd031f8db23" colspan="10" rules="bottom" align="left"> S - Boxes of most recent version of GOST </th>
                </tr>
              </thead>
              <tbody id="ts-4ada9b9bb668">
                <tr id="tr-8e1225d6eb12">
                  <td id="tc-8f609148c2a4" rules="bottom" align="left">SLEA-Box</td>
                  <td id="tc-bef520d22620" rules="bottom" align="left">GOST-Box</td>
                  <td id="tc-fffde0f0d8b2" rules="bottom" align="left">S[3]</td>
                  <td id="tc-2a78a0560b5b" rules="bottom" align="left">S[2]</td>
                  <td id="tc-a5463b3131dd" rules="bottom" align="left">S[1]</td>
                  <td id="tc-f670b61a0718" rules="bottom" align="left">S[0]</td>
                  <td id="tc-e4f125bd39e1" rules="bottom" align="left">Max</td>
                  <td id="tc-f23aac4dc043" rules="bottom" align="left">Min</td>
                  <td id="tc-9f35432b405d" rules="bottom" align="left"> </td>
                  <td id="tc-7fd0b673c55d" rules="bottom" align="left">SACAvg</td>
                </tr>
                <tr id="tr-baf0887f156a">
                  <td id="tc-15f034dd68f1" rules="bottom" align="left">S1</td>
                  <td id="tc-2c7041c564f1" rules="bottom" align="left">S3</td>
                  <td id="tc-38d677398d3e" rules="bottom" align="left">0.5625</td>
                  <td id="tc-3efc39072c46" rules="bottom" align="left">0.5625</td>
                  <td id="tc-dc0f454dfc42" rules="bottom" align="left">0.4375</td>
                  <td id="tc-7c4a8ddcdd94" rules="bottom" align="left">0.5</td>
                  <td id="tc-fe419c9dd110" rules="bottom" align="left">0.5625</td>
                  <td id="tc-345fde360c06" rules="bottom" align="left">0.4375</td>
                  <td id="tc-3079bc8d077b" rules="bottom" align="left">0.25</td>
                  <td id="tc-ba2ba4baf856" rules="bottom" align="left">0.515625</td>
                </tr>
                <tr id="tr-6f52404dcd09">
                  <td id="tc-deb6365badb1" rules="bottom" align="left">S2</td>
                  <td id="tc-c7a873a59338" rules="bottom" align="left">S4</td>
                  <td id="tc-bbdd542fbe37" rules="bottom" align="left">0.5625</td>
                  <td id="tc-86bd9d97dcf1" rules="bottom" align="left">0.5625</td>
                  <td id="tc-6beb8de79d30" rules="bottom" align="left">0.5</td>
                  <td id="tc-093d145f5f1f" rules="bottom" align="left">0.5</td>
                  <td id="tc-f868be8c8c3b" rules="bottom" align="left">0.5625</td>
                  <td id="tc-cc3abb71f8fb" rules="bottom" align="left">0.5</td>
                  <td id="tc-1764026a9912" rules="bottom" align="left">0.125</td>
                  <td id="tc-5b3b85de109d" rules="bottom" align="left">0.53125</td>
                </tr>
                <tr id="tr-85117178a4b3">
                  <td id="tc-1482847b1992" rules="bottom" align="left">S3</td>
                  <td id="tc-9cc69b3e04a2" rules="bottom" align="left">S6</td>
                  <td id="tc-302f97536571" rules="bottom" align="left">0.5625</td>
                  <td id="tc-a715041e157d" rules="bottom" align="left">0.5</td>
                  <td id="tc-05fa93e6237c" rules="bottom" align="left">0.625</td>
                  <td id="tc-dabca57fad19" rules="bottom" align="left">0.5</td>
                  <td id="tc-4cf594f3507e" rules="bottom" align="left">0.625</td>
                  <td id="tc-49a2a2e92f1a" rules="bottom" align="left">0.5</td>
                  <td id="tc-92e6f9744917" rules="bottom" align="left">0.25</td>
                  <td id="tc-12191a838744" rules="bottom" align="left">0.546875</td>
                </tr>
                <tr id="tr-5156ba38fa3b">
                  <td id="tc-9e9c63d85968" rules="bottom" align="left">S4</td>
                  <td id="tc-fd96d0d39a4d" rules="bottom" align="left">S8</td>
                  <td id="tc-bd11fb795ec7" rules="bottom" align="left">0.5</td>
                  <td id="tc-c947be36b41b" rules="bottom" align="left">0.4375</td>
                  <td id="tc-f0e46fbd1cfe" rules="bottom" align="left">0.5</td>
                  <td id="tc-fcdbd78bb7a2" rules="bottom" align="left">0.5625</td>
                  <td id="tc-ac0331a38719" rules="bottom" align="left">0.5625</td>
                  <td id="tc-ee1c4c03d1db" rules="bottom" align="left">0.4375</td>
                  <td id="tc-5a533f2ad21d" rules="bottom" align="left">0.25</td>
                  <td id="tc-b72985bd0f50" rules="bottom" align="left">0.5 </td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p id="p-d931eb9ab83d"> In S-boxes of the most recent version of GOST, S8 has the best average SAC value, but S4 has the smallest relative error this mean that the value of average SAC only may lead to inefficient result. It has to be taken in account both values of average SAC and relative error.</p>
          <list list-type="bullet">
            <list-item id="li-6b3478a14da3">
              <p>
                <bold id="s-eecc0803dfb5"> Robustness</bold>
              </p>
            </list-item>
          </list>
          <p id="p-c93ea490c157">Seberry (Seberry, Zhang &amp; Zheng, 1993) defines an expression for the robustness, <italic id="e-d8cb801d8031">R</italic>, of an S-box. The robustness (R) is a measure of the resistance of an S-box to differential cryptanalysis. Robustness is based on two features of the Differential Distribution Table (DDT). The first is the number of nonzero elements, <italic id="e-8421f5ed540c">N</italic>, in the first column of the DDT (excluding the first element). These denote instances when a change in the input results in no change in the output. Such occurrences are a weakness as they reduce the complexity of an algorithm and play an important part in differential cryptanalysis. The other feature is the largest value found in the DDT, <italic id="e-fc5fbe6c0ee7">L</italic>, other than the top left element. The robustness is given by equation 5:</p>
          <p id="p-cd50376c14e2">where <italic id="e-519c66ca4c5a">n </italic> is the number of input bits. The higher <italic id="e-5ea871a9afec">R </italic> is, the more difficult differential cryptanalysis is to perform. Table 3 and Table 4 show the  differential distribution and the linear approximation of the S-box (S1-box) respectively. </p>
          <table-wrap id="tw-beb5c9f80070" orientation="potrait" width="twocolumn" autobreak="true">
            <label>Table 3</label>
            <caption id="c-125f4096ee6e">
              <title id="t-e1c2e3ba7d23">The differential distribution (XOR distribution) of S1 (S3 of new GOST S-box)</title>
            </caption>
            <table id="t-6339951508ee" rules="rows">
              <colgroup/>
              <tbody id="ts-aabf4b3e0ba3">
                <tr id="tr-e30894a6d70e">
                  <td id="tc-b8fd4754d0a8" rules="bottom" align="left">I/P - O/P XORDifference</td>
                  <td id="tc-d55317f2a483" rules="bottom" align="left">0</td>
                  <td id="tc-ccd2e1e78d40" rules="bottom" align="left">1</td>
                  <td id="tc-6e8340e1bf9c" rules="bottom" align="left">2</td>
                  <td id="tc-f4ea60da2c7a" rules="bottom" align="left">3</td>
                  <td id="tc-431d6c95316b" rules="bottom" align="left">4</td>
                  <td id="tc-3a6c8c5950ea" rules="bottom" align="left">5</td>
                  <td id="tc-8f8a2210b27d" rules="bottom" align="left">6</td>
                  <td id="tc-a435193c0eea" rules="bottom" align="left">7</td>
                  <td id="tc-81dae98697c2" rules="bottom" align="left">8</td>
                  <td id="tc-aafaf1ec4d30" rules="bottom" align="left">9</td>
                  <td id="tc-1a1f30109912" rules="bottom" align="left">10</td>
                  <td id="tc-05ef2e257bc2" rules="bottom" align="left">11</td>
                  <td id="tc-8f0cd82306e1" rules="bottom" align="left">12</td>
                  <td id="tc-0168171b43ba" rules="bottom" align="left">13</td>
                  <td id="tc-51a8b2762f3f" rules="bottom" align="left">14</td>
                  <td id="tc-c75ce99d8c0e" rules="bottom" align="left">15</td>
                </tr>
                <tr id="tr-39052785b86b">
                  <td id="tc-91c402fcd83a" rules="bottom" align="left">0</td>
                  <td id="tc-cbf617971499" rules="bottom" align="left">16</td>
                  <td id="tc-a0ed4581a796" rules="bottom" align="left">0</td>
                  <td id="tc-ce83b5b15c31" rules="bottom" align="left">0</td>
                  <td id="tc-91760550071e" rules="bottom" align="left">0</td>
                  <td id="tc-0a1535d9902d" rules="bottom" align="left">0</td>
                  <td id="tc-3f922a9677a8" rules="bottom" align="left">0</td>
                  <td id="tc-b65d899db250" rules="bottom" align="left">0</td>
                  <td id="tc-f7019d318dd5" rules="bottom" align="left">0</td>
                  <td id="tc-62f561a4f335" rules="bottom" align="left">0</td>
                  <td id="tc-2fc3a9fb23de" rules="bottom" align="left">0</td>
                  <td id="tc-d03541d928b5" rules="bottom" align="left">0</td>
                  <td id="tc-ce203e60c4fe" rules="bottom" align="left">0</td>
                  <td id="tc-d51696f4fd82" rules="bottom" align="left">0</td>
                  <td id="tc-427347a61c86" rules="bottom" align="left">0</td>
                  <td id="tc-711ff61fef1d" rules="bottom" align="left">0</td>
                  <td id="tc-85459a1b556a" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-c2b376769e4e">
                  <td id="tc-2b8818f78da8" rules="bottom" align="left">1</td>
                  <td id="tc-8bdfe75fcd16" rules="bottom" align="left">0</td>
                  <td id="tc-cc88ff63d4e3" rules="bottom" align="left">0</td>
                  <td id="tc-86470622acd5" rules="bottom" align="left">0</td>
                  <td id="tc-158c5606fe90" rules="bottom" align="left">2</td>
                  <td id="tc-4e12964359d6" rules="bottom" align="left">0</td>
                  <td id="tc-0268963a9622" rules="bottom" align="left">2</td>
                  <td id="tc-25c58af1376f" rules="bottom" align="left">2</td>
                  <td id="tc-70aa2e3e5e54" rules="bottom" align="left">2</td>
                  <td id="tc-3e190c36b6ab" rules="bottom" align="left">2</td>
                  <td id="tc-383aee556fd3" rules="bottom" align="left">0</td>
                  <td id="tc-fd6c15362641" rules="bottom" align="left">0</td>
                  <td id="tc-9d4dcbef13f5" rules="bottom" align="left">0</td>
                  <td id="tc-df3de039d2c5" rules="bottom" align="left">0</td>
                  <td id="tc-d804d29f27cb" rules="bottom" align="left">4</td>
                  <td id="tc-85189c2b969f" rules="bottom" align="left">0</td>
                  <td id="tc-37ce49ce1504" rules="bottom" align="left">2</td>
                </tr>
                <tr id="tr-43f5fb4831f9">
                  <td id="tc-11f31a762663" rules="bottom" align="left">2</td>
                  <td id="tc-aa0dfa9b51f5" rules="bottom" align="left">0</td>
                  <td id="tc-4883004f6310" rules="bottom" align="left">0</td>
                  <td id="tc-5d3e3e388d70" rules="bottom" align="left">2</td>
                  <td id="tc-0394569ffb3d" rules="bottom" align="left">0</td>
                  <td id="tc-d71b55d6df1d" rules="bottom" align="left">0</td>
                  <td id="tc-4cf885880284" rules="bottom" align="left">2</td>
                  <td id="tc-1c0ef812c177" rules="bottom" align="left">0</td>
                  <td id="tc-8bc7d8f5c218" rules="bottom" align="left">0</td>
                  <td id="tc-415a4155d6c5" rules="bottom" align="left">2</td>
                  <td id="tc-cd6832686fe3" rules="bottom" align="left">4</td>
                  <td id="tc-8b75d1337394" rules="bottom" align="left">2</td>
                  <td id="tc-cd299585bfdf" rules="bottom" align="left">2</td>
                  <td id="tc-f30c490c5dad" rules="bottom" align="left">0</td>
                  <td id="tc-e60682eb6f49" rules="bottom" align="left">0</td>
                  <td id="tc-acfb73e43032" rules="bottom" align="left">2</td>
                  <td id="tc-6f41ac0d9451" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-9dc2a0e66817">
                  <td id="tc-5abfb2430b71" rules="bottom" align="left">3</td>
                  <td id="tc-7efad702f5ef" rules="bottom" align="left">0</td>
                  <td id="tc-62d688860ba6" rules="bottom" align="left">0</td>
                  <td id="tc-ad9387321373" rules="bottom" align="left">0</td>
                  <td id="tc-292e2b082008" rules="bottom" align="left">2</td>
                  <td id="tc-42dcf7fa3618" rules="bottom" align="left">0</td>
                  <td id="tc-ba4febe71c1c" rules="bottom" align="left">2</td>
                  <td id="tc-144bb5eb7c31" rules="bottom" align="left">4</td>
                  <td id="tc-c71c7f8c5fd5" rules="bottom" align="left">0</td>
                  <td id="tc-9ce7e3416f54" rules="bottom" align="left">0</td>
                  <td id="tc-b807e676abb2" rules="bottom" align="left">0</td>
                  <td id="tc-e52993801713" rules="bottom" align="left">2</td>
                  <td id="tc-6b4d2b3a03a7" rules="bottom" align="left">0</td>
                  <td id="tc-7dc77d1f95df" rules="bottom" align="left">2</td>
                  <td id="tc-30ab1002f19c" rules="bottom" align="left">0</td>
                  <td id="tc-c08e74d9bc33" rules="bottom" align="left">0</td>
                  <td id="tc-13266db61cca" rules="bottom" align="left">4</td>
                </tr>
                <tr id="tr-1208ffd612e7">
                  <td id="tc-22cd109b363d" rules="bottom" align="left">4</td>
                  <td id="table-cell-87" rules="bottom" align="left">0</td>
                  <td id="table-cell-88" rules="bottom" align="left">2</td>
                  <td id="table-cell-89" rules="bottom" align="left">2</td>
                  <td id="table-cell-90" rules="bottom" align="left">0</td>
                  <td id="table-cell-91" rules="bottom" align="left">2</td>
                  <td id="table-cell-92" rules="bottom" align="left">2</td>
                  <td id="table-cell-93" rules="bottom" align="left">0</td>
                  <td id="table-cell-94" rules="bottom" align="left">0</td>
                  <td id="table-cell-95" rules="bottom" align="left">2</td>
                  <td id="table-cell-96" rules="bottom" align="left">2</td>
                  <td id="table-cell-97" rules="bottom" align="left">0</td>
                  <td id="table-cell-98" rules="bottom" align="left">0</td>
                  <td id="table-cell-99" rules="bottom" align="left">2</td>
                  <td id="table-cell-100" rules="bottom" align="left">0</td>
                  <td id="table-cell-101" rules="bottom" align="left">0</td>
                  <td id="table-cell-102" rules="bottom" align="left">2</td>
                </tr>
                <tr id="table-row-7">
                  <td id="table-cell-103" rules="bottom" align="left">5</td>
                  <td id="table-cell-104" rules="bottom" align="left">0</td>
                  <td id="table-cell-105" rules="bottom" align="left">2</td>
                  <td id="table-cell-106" rules="bottom" align="left">4</td>
                  <td id="table-cell-107" rules="bottom" align="left">0</td>
                  <td id="table-cell-108" rules="bottom" align="left">2</td>
                  <td id="table-cell-109" rules="bottom" align="left">0</td>
                  <td id="table-cell-110" rules="bottom" align="left">0</td>
                  <td id="table-cell-111" rules="bottom" align="left">4</td>
                  <td id="table-cell-112" rules="bottom" align="left">2</td>
                  <td id="table-cell-113" rules="bottom" align="left">0</td>
                  <td id="table-cell-114" rules="bottom" align="left">0</td>
                  <td id="table-cell-115" rules="bottom" align="left">0</td>
                  <td id="table-cell-116" rules="bottom" align="left">0</td>
                  <td id="table-cell-117" rules="bottom" align="left">2</td>
                  <td id="table-cell-118" rules="bottom" align="left">0</td>
                  <td id="table-cell-119" rules="bottom" align="left">0</td>
                </tr>
                <tr id="table-row-8">
                  <td id="table-cell-120" rules="bottom" align="left">6</td>
                  <td id="table-cell-121" rules="bottom" align="left">0</td>
                  <td id="table-cell-122" rules="bottom" align="left">4</td>
                  <td id="table-cell-123" rules="bottom" align="left">0</td>
                  <td id="table-cell-124" rules="bottom" align="left">0</td>
                  <td id="table-cell-125" rules="bottom" align="left">0</td>
                  <td id="table-cell-126" rules="bottom" align="left">0</td>
                  <td id="table-cell-127" rules="bottom" align="left">0</td>
                  <td id="table-cell-128" rules="bottom" align="left">4</td>
                  <td id="table-cell-129" rules="bottom" align="left">2</td>
                  <td id="table-cell-130" rules="bottom" align="left">0</td>
                  <td id="table-cell-131" rules="bottom" align="left">0</td>
                  <td id="table-cell-132" rules="bottom" align="left">2</td>
                  <td id="table-cell-133" rules="bottom" align="left">0</td>
                  <td id="table-cell-134" rules="bottom" align="left">2</td>
                  <td id="table-cell-135" rules="bottom" align="left">2</td>
                  <td id="table-cell-136" rules="bottom" align="left">0</td>
                </tr>
                <tr id="table-row-9">
                  <td id="table-cell-137" rules="bottom" align="left">7</td>
                  <td id="table-cell-138" rules="bottom" align="left">0</td>
                  <td id="table-cell-139" rules="bottom" align="left">0</td>
                  <td id="table-cell-140" rules="bottom" align="left">0</td>
                  <td id="table-cell-141" rules="bottom" align="left">0</td>
                  <td id="table-cell-142" rules="bottom" align="left">0</td>
                  <td id="table-cell-143" rules="bottom" align="left">0</td>
                  <td id="table-cell-144" rules="bottom" align="left">2</td>
                  <td id="table-cell-145" rules="bottom" align="left">2</td>
                  <td id="table-cell-146" rules="bottom" align="left">2</td>
                  <td id="table-cell-147" rules="bottom" align="left">2</td>
                  <td id="table-cell-148" rules="bottom" align="left">4</td>
                  <td id="table-cell-149" rules="bottom" align="left">0</td>
                  <td id="table-cell-150" rules="bottom" align="left">0</td>
                  <td id="table-cell-151" rules="bottom" align="left">0</td>
                  <td id="table-cell-152" rules="bottom" align="left">4</td>
                  <td id="table-cell-153" rules="bottom" align="left">0</td>
                </tr>
                <tr id="table-row-10">
                  <td id="table-cell-154" rules="bottom" align="left">8</td>
                  <td id="table-cell-155" rules="bottom" align="left">0</td>
                  <td id="table-cell-156" rules="bottom" align="left">0</td>
                  <td id="table-cell-157" rules="bottom" align="left">4</td>
                  <td id="table-cell-158" rules="bottom" align="left">0</td>
                  <td id="table-cell-159" rules="bottom" align="left">0</td>
                  <td id="table-cell-160" rules="bottom" align="left">2</td>
                  <td id="table-cell-161" rules="bottom" align="left">2</td>
                  <td id="table-cell-162" rules="bottom" align="left">0</td>
                  <td id="table-cell-163" rules="bottom" align="left">0</td>
                  <td id="table-cell-164" rules="bottom" align="left">0</td>
                  <td id="table-cell-165" rules="bottom" align="left">0</td>
                  <td id="table-cell-166" rules="bottom" align="left">0</td>
                  <td id="table-cell-167" rules="bottom" align="left">4</td>
                  <td id="table-cell-168" rules="bottom" align="left">2</td>
                  <td id="table-cell-169" rules="bottom" align="left">2</td>
                  <td id="table-cell-170" rules="bottom" align="left">0</td>
                </tr>
                <tr id="table-row-11">
                  <td id="table-cell-171" rules="bottom" align="left">9</td>
                  <td id="table-cell-172" rules="bottom" align="left">0</td>
                  <td id="table-cell-173" rules="bottom" align="left">2</td>
                  <td id="table-cell-174" rules="bottom" align="left">0</td>
                  <td id="table-cell-175" rules="bottom" align="left">2</td>
                  <td id="table-cell-176" rules="bottom" align="left">0</td>
                  <td id="table-cell-177" rules="bottom" align="left">0</td>
                  <td id="table-cell-178" rules="bottom" align="left">0</td>
                  <td id="table-cell-179" rules="bottom" align="left">0</td>
                  <td id="table-cell-180" rules="bottom" align="left">0</td>
                  <td id="table-cell-181" rules="bottom" align="left">0</td>
                  <td id="table-cell-182" rules="bottom" align="left">4</td>
                  <td id="table-cell-183" rules="bottom" align="left">4</td>
                  <td id="table-cell-184" rules="bottom" align="left">0</td>
                  <td id="table-cell-185" rules="bottom" align="left">2</td>
                  <td id="table-cell-186" rules="bottom" align="left">0</td>
                  <td id="table-cell-187" rules="bottom" align="left">2</td>
                </tr>
                <tr id="table-row-12">
                  <td id="table-cell-188" rules="bottom" align="left">10</td>
                  <td id="table-cell-189" rules="bottom" align="left">0</td>
                  <td id="table-cell-190" rules="bottom" align="left">0</td>
                  <td id="table-cell-191" rules="bottom" align="left">0</td>
                  <td id="table-cell-192" rules="bottom" align="left">0</td>
                  <td id="table-cell-193" rules="bottom" align="left">4</td>
                  <td id="table-cell-194" rules="bottom" align="left">0</td>
                  <td id="table-cell-195" rules="bottom" align="left">2</td>
                  <td id="table-cell-196" rules="bottom" align="left">2</td>
                  <td id="table-cell-197" rules="bottom" align="left">0</td>
                  <td id="table-cell-198" rules="bottom" align="left">2</td>
                  <td id="table-cell-199" rules="bottom" align="left">0</td>
                  <td id="table-cell-200" rules="bottom" align="left">2</td>
                  <td id="table-cell-201" rules="bottom" align="left">2</td>
                  <td id="table-cell-202" rules="bottom" align="left">0</td>
                  <td id="table-cell-203" rules="bottom" align="left">0</td>
                  <td id="table-cell-204" rules="bottom" align="left">2</td>
                </tr>
                <tr id="table-row-13">
                  <td id="table-cell-205" rules="bottom" align="left">11</td>
                  <td id="table-cell-206" rules="bottom" align="left">0</td>
                  <td id="table-cell-207" rules="bottom" align="left">2</td>
                  <td id="table-cell-208" rules="bottom" align="left">2</td>
                  <td id="table-cell-209" rules="bottom" align="left">2</td>
                  <td id="table-cell-210" rules="bottom" align="left">4</td>
                  <td id="table-cell-211" rules="bottom" align="left">0</td>
                  <td id="table-cell-212" rules="bottom" align="left">2</td>
                  <td id="table-cell-213" rules="bottom" align="left">0</td>
                  <td id="table-cell-214" rules="bottom" align="left">0</td>
                  <td id="table-cell-215" rules="bottom" align="left">2</td>
                  <td id="table-cell-216" rules="bottom" align="left">0</td>
                  <td id="table-cell-217" rules="bottom" align="left">0</td>
                  <td id="table-cell-218" rules="bottom" align="left">0</td>
                  <td id="table-cell-219" rules="bottom" align="left">0</td>
                  <td id="table-cell-220" rules="bottom" align="left">0</td>
                  <td id="table-cell-221" rules="bottom" align="left">2</td>
                </tr>
                <tr id="table-row-14">
                  <td id="table-cell-222" rules="bottom" align="left">12</td>
                  <td id="table-cell-223" rules="bottom" align="left">0</td>
                  <td id="table-cell-224" rules="bottom" align="left">0</td>
                  <td id="table-cell-225" rules="bottom" align="left">0</td>
                  <td id="table-cell-226" rules="bottom" align="left">2</td>
                  <td id="table-cell-227" rules="bottom" align="left">0</td>
                  <td id="table-cell-228" rules="bottom" align="left">0</td>
                  <td id="table-cell-229" rules="bottom" align="left">0</td>
                  <td id="table-cell-230" rules="bottom" align="left">2</td>
                  <td id="table-cell-231" rules="bottom" align="left">2</td>
                  <td id="table-cell-232" rules="bottom" align="left">2</td>
                  <td id="table-cell-233" rules="bottom" align="left">2</td>
                  <td id="table-cell-234" rules="bottom" align="left">0</td>
                  <td id="table-cell-235" rules="bottom" align="left">2</td>
                  <td id="table-cell-236" rules="bottom" align="left">2</td>
                  <td id="table-cell-237" rules="bottom" align="left">2</td>
                  <td id="table-cell-238" rules="bottom" align="left">0</td>
                </tr>
                <tr id="table-row-15">
                  <td id="table-cell-239" rules="bottom" align="left">13</td>
                  <td id="table-cell-240" rules="bottom" align="left">0</td>
                  <td id="table-cell-241" rules="bottom" align="left">2</td>
                  <td id="table-cell-242" rules="bottom" align="left">2</td>
                  <td id="table-cell-243" rules="bottom" align="left">2</td>
                  <td id="table-cell-244" rules="bottom" align="left">0</td>
                  <td id="table-cell-245" rules="bottom" align="left">2</td>
                  <td id="table-cell-246" rules="bottom" align="left">0</td>
                  <td id="table-cell-247" rules="bottom" align="left">0</td>
                  <td id="table-cell-248" rules="bottom" align="left">0</td>
                  <td id="table-cell-249" rules="bottom" align="left">0</td>
                  <td id="table-cell-250" rules="bottom" align="left">2</td>
                  <td id="table-cell-251" rules="bottom" align="left">0</td>
                  <td id="table-cell-252" rules="bottom" align="left">0</td>
                  <td id="table-cell-253" rules="bottom" align="left">0</td>
                  <td id="table-cell-254" rules="bottom" align="left">4</td>
                  <td id="table-cell-255" rules="bottom" align="left">2</td>
                </tr>
                <tr id="table-row-16">
                  <td id="table-cell-256" rules="bottom" align="left">14</td>
                  <td id="table-cell-257" rules="bottom" align="left">0</td>
                  <td id="table-cell-258" rules="bottom" align="left">2</td>
                  <td id="table-cell-259" rules="bottom" align="left">0</td>
                  <td id="table-cell-260" rules="bottom" align="left">2</td>
                  <td id="table-cell-261" rules="bottom" align="left">2</td>
                  <td id="table-cell-262" rules="bottom" align="left">2</td>
                  <td id="table-cell-263" rules="bottom" align="left">0</td>
                  <td id="table-cell-264" rules="bottom" align="left">0</td>
                  <td id="table-cell-265" rules="bottom" align="left">0</td>
                  <td id="table-cell-266" rules="bottom" align="left">2</td>
                  <td id="table-cell-267" rules="bottom" align="left">0</td>
                  <td id="table-cell-268" rules="bottom" align="left">2</td>
                  <td id="table-cell-269" rules="bottom" align="left">2</td>
                  <td id="table-cell-270" rules="bottom" align="left">2</td>
                  <td id="table-cell-271" rules="bottom" align="left">0</td>
                  <td id="table-cell-272" rules="bottom" align="left">0</td>
                </tr>
                <tr id="table-row-17">
                  <td id="table-cell-273" rules="bottom" align="left">15</td>
                  <td id="table-cell-274" rules="bottom" align="left">0</td>
                  <td id="table-cell-275" rules="bottom" align="left">0</td>
                  <td id="table-cell-276" rules="bottom" align="left">0</td>
                  <td id="table-cell-277" rules="bottom" align="left">2</td>
                  <td id="table-cell-278" rules="bottom" align="left">2</td>
                  <td id="table-cell-279" rules="bottom" align="left">2</td>
                  <td id="table-cell-280" rules="bottom" align="left">2</td>
                  <td id="table-cell-281" rules="bottom" align="left">0</td>
                  <td id="table-cell-282" rules="bottom" align="left">2</td>
                  <td id="table-cell-283" rules="bottom" align="left">0</td>
                  <td id="table-cell-284" rules="bottom" align="left">0</td>
                  <td id="table-cell-285" rules="bottom" align="left">4</td>
                  <td id="table-cell-286" rules="bottom" align="left">2</td>
                  <td id="table-cell-287" rules="bottom" align="left">0</td>
                  <td id="table-cell-288" rules="bottom" align="left">0</td>
                  <td id="table-cell-289" rules="bottom" align="left">0</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p id="p-ceaab8b214ff"/>
          <p id="p-8eb307326d3f"/>
          <table-wrap id="tw-16f38372f067" orientation="potrait" width="twocolumn" autobreak="true">
            <label>Table 4</label>
            <caption id="c-475fdc9a0c37">
              <title id="t-10889d44fb5a">The linear approximation of S1 (S3 new GOST S-box)</title>
            </caption>
            <table id="t-f5881c18378b" rules="rows">
              <colgroup/>
              <tbody id="ts-19a4751174d8">
                <tr id="tr-7df8166c35d4">
                  <td id="tc-c4b08912f861" rules="bottom" align="left">8</td>
                  <td id="tc-ef8009189bec" rules="bottom" align="left">0</td>
                  <td id="tc-d50551bf5ba1" rules="bottom" align="left">0</td>
                  <td id="tc-a438f0416aee" rules="bottom" align="left">0</td>
                  <td id="tc-6d664786d47e" rules="bottom" align="left">0</td>
                  <td id="tc-f1a98e5e4069" rules="bottom" align="left">0</td>
                  <td id="tc-fb716b1f9023" rules="bottom" align="left">0</td>
                  <td id="tc-9491dd6659ea" rules="bottom" align="left">0</td>
                  <td id="tc-af01ec3743ec" rules="bottom" align="left">0</td>
                  <td id="tc-82ca5db3ac01" rules="bottom" align="left">0</td>
                  <td id="tc-29d6834738a3" rules="bottom" align="left">0</td>
                  <td id="tc-12b7ba8f92b5" rules="bottom" align="left">0</td>
                  <td id="tc-cf413279854f" rules="bottom" align="left">0</td>
                  <td id="tc-07189214a885" rules="bottom" align="left">0</td>
                  <td id="tc-3143504e5a4e" rules="bottom" align="left">0</td>
                  <td id="tc-62ba4234ea73" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-d3fa2981c7ce">
                  <td id="tc-9e8c0f24c82d" rules="bottom" align="left">0</td>
                  <td id="tc-799be22c6f96" rules="bottom" align="left">2</td>
                  <td id="tc-4ff37bb8c96e" rules="bottom" align="left">-4</td>
                  <td id="tc-68ce60a91971" rules="bottom" align="left">-2</td>
                  <td id="tc-0a8da79cb72b" rules="bottom" align="left">0</td>
                  <td id="tc-49b5b3db9427" rules="bottom" align="left">-2</td>
                  <td id="tc-ec334e065d7e" rules="bottom" align="left">0</td>
                  <td id="tc-e888ae1de9e4" rules="bottom" align="left">-2</td>
                  <td id="tc-21c943f75c19" rules="bottom" align="left">-2</td>
                  <td id="tc-4ec1ba347d4f" rules="bottom" align="left">0</td>
                  <td id="tc-8b4a425be741" rules="bottom" align="left">-2</td>
                  <td id="tc-14f0e9b84ba1" rules="bottom" align="left">0</td>
                  <td id="tc-e7e44fa281f9" rules="bottom" align="left">-2</td>
                  <td id="tc-78981b01c0fa" rules="bottom" align="left">4</td>
                  <td id="tc-50c8cf72e524" rules="bottom" align="left">2</td>
                  <td id="tc-56af78731a52" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-60da8a97e38d">
                  <td id="tc-190f64644f47" rules="bottom" align="left">0</td>
                  <td id="tc-6a661355465c" rules="bottom" align="left">-2</td>
                  <td id="tc-0ae556f150f3" rules="bottom" align="left">-2</td>
                  <td id="tc-5d35cfd04845" rules="bottom" align="left">2</td>
                  <td id="tc-770d9eb6311d" rules="bottom" align="left">-2</td>
                  <td id="tc-30f73ebf0806" rules="bottom" align="left">0</td>
                  <td id="tc-a9c98600e1f2" rules="bottom" align="left">-4</td>
                  <td id="tc-5a9af3e862f3" rules="bottom" align="left">0</td>
                  <td id="tc-88beebc71675" rules="bottom" align="left">0</td>
                  <td id="tc-816a2fd2afa9" rules="bottom" align="left">0</td>
                  <td id="tc-af76e170f24c" rules="bottom" align="left">4</td>
                  <td id="tc-6d332ddc4940" rules="bottom" align="left">-2</td>
                  <td id="tc-f8d4ffad2d89" rules="bottom" align="left">-2</td>
                  <td id="tc-cd4d9db9e10a" rules="bottom" align="left">2</td>
                  <td id="tc-f7a68e541063" rules="bottom" align="left">-2</td>
                  <td id="tc-301e41d96c8a" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-cec25d568566">
                  <td id="tc-10eb93abc340" rules="bottom" align="left">0</td>
                  <td id="tc-a7324e84f2d2" rules="bottom" align="left">-2</td>
                  <td id="tc-10c7096a4f41" rules="bottom" align="left">0</td>
                  <td id="tc-a816b3eef96a" rules="bottom" align="left">0</td>
                  <td id="tc-dd4271d75c26" rules="bottom" align="left">2</td>
                  <td id="tc-f3ccbda7c9e6" rules="bottom" align="left">2</td>
                  <td id="tc-86c74f5ef1d2" rules="bottom" align="left">-2</td>
                  <td id="tc-ed7d8e13cee2" rules="bottom" align="left">-4</td>
                  <td id="tc-f4210230c405" rules="bottom" align="left">0</td>
                  <td id="tc-ce28004f1046" rules="bottom" align="left">2</td>
                  <td id="tc-6b2c14278fe9" rules="bottom" align="left">-2</td>
                  <td id="tc-95e103747b94" rules="bottom" align="left">2</td>
                  <td id="tc-4a5135c7f5a8" rules="bottom" align="left">0</td>
                  <td id="tc-6d8b0f94a056" rules="bottom" align="left">0</td>
                  <td id="tc-1234bbc267f5" rules="bottom" align="left">-2</td>
                  <td id="tc-7ba642ac5311" rules="bottom" align="left">-4</td>
                </tr>
                <tr id="tr-21508f004a9c">
                  <td id="tc-301b0c5bbd65" rules="bottom" align="left">0</td>
                  <td id="tc-1c8b4bc73f8e" rules="bottom" align="left">-2</td>
                  <td id="tc-c7f71bd9b218" rules="bottom" align="left">-2</td>
                  <td id="tc-8133a380d944" rules="bottom" align="left">2</td>
                  <td id="tc-285504d0186c" rules="bottom" align="left">-2</td>
                  <td id="tc-44e9f91203e1" rules="bottom" align="left">0</td>
                  <td id="tc-6297f4d1c9d4" rules="bottom" align="left">4</td>
                  <td id="tc-6cb26216ab1f" rules="bottom" align="left">0</td>
                  <td id="tc-1ed9130aeb1a" rules="bottom" align="left">-4</td>
                  <td id="tc-77e624be722e" rules="bottom" align="left">0</td>
                  <td id="tc-d53d3d0715fd" rules="bottom" align="left">0</td>
                  <td id="tc-e447e67bed57" rules="bottom" align="left">2</td>
                  <td id="tc-9245e974294b" rules="bottom" align="left">-2</td>
                  <td id="tc-0ccc2ad59c38" rules="bottom" align="left">-2</td>
                  <td id="tc-bb02447ef091" rules="bottom" align="left">-2</td>
                  <td id="tc-7bba76749fad" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-a21148c7d45a">
                  <td id="tc-74910daa124f" rules="bottom" align="left">0</td>
                  <td id="tc-928ab20a80d6" rules="bottom" align="left">4</td>
                  <td id="tc-1a232d3936f7" rules="bottom" align="left">2</td>
                  <td id="tc-f3ea227190eb" rules="bottom" align="left">0</td>
                  <td id="tc-8b894314aa39" rules="bottom" align="left">-2</td>
                  <td id="tc-02d7e76faefb" rules="bottom" align="left">2</td>
                  <td id="tc-4ce0349bda8e" rules="bottom" align="left">0</td>
                  <td id="tc-dba6da27d9e1" rules="bottom" align="left">2</td>
                  <td id="tc-ac806db3f25f" rules="bottom" align="left">-2</td>
                  <td id="tc-f4483f330d49" rules="bottom" align="left">0</td>
                  <td id="tc-ff8ca46c5ea0" rules="bottom" align="left">2</td>
                  <td id="tc-33244447202c" rules="bottom" align="left">2</td>
                  <td id="tc-3162c674ff13" rules="bottom" align="left">0</td>
                  <td id="tc-7fb5fd91a251" rules="bottom" align="left">2</td>
                  <td id="tc-928e69769cca" rules="bottom" align="left">0</td>
                  <td id="tc-b115f091c859" rules="bottom" align="left">-4</td>
                </tr>
                <tr id="tr-8ff60de2439b">
                  <td id="tc-c9516be5cccb" rules="bottom" align="left">0</td>
                  <td id="tc-36a3b977642b" rules="bottom" align="left">-4</td>
                  <td id="tc-12a71c79ac72" rules="bottom" align="left">0</td>
                  <td id="tc-e2bf911071ac" rules="bottom" align="left">-2</td>
                  <td id="tc-b1f8bef1ec7a" rules="bottom" align="left">-2</td>
                  <td id="tc-ef69246b7845" rules="bottom" align="left">0</td>
                  <td id="tc-a6f9eb9563f3" rules="bottom" align="left">2</td>
                  <td id="tc-b1954a7d1568" rules="bottom" align="left">2</td>
                  <td id="tc-bf5c1c1037c9" rules="bottom" align="left">2</td>
                  <td id="tc-ec02e79e1adb" rules="bottom" align="left">2</td>
                  <td id="tc-c4d579014d3e" rules="bottom" align="left">0</td>
                  <td id="tc-d8a1c566024e" rules="bottom" align="left">2</td>
                  <td id="tc-506730e56e37" rules="bottom" align="left">2</td>
                  <td id="tc-4b0e89f5d530" rules="bottom" align="left">4</td>
                  <td id="tc-d44555634bf6" rules="bottom" align="left">0</td>
                  <td id="tc-fce072e660d0" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-445e3445f99f">
                  <td id="tc-d5f7084e1b4b" rules="bottom" align="left">0</td>
                  <td id="tc-d109f062643e" rules="bottom" align="left">0</td>
                  <td id="tc-49df168df6ee" rules="bottom" align="left">2</td>
                  <td id="tc-fc1f9b220aa0" rules="bottom" align="left">4</td>
                  <td id="tc-5d753010597f" rules="bottom" align="left">2</td>
                  <td id="tc-679d0367463f" rules="bottom" align="left">-2</td>
                  <td id="tc-94e81d674d62" rules="bottom" align="left">0</td>
                  <td id="tc-3f8fc6f6a151" rules="bottom" align="left">2</td>
                  <td id="tc-4b35421f2782" rules="bottom" align="left">-2</td>
                  <td id="tc-df2f95110c72" rules="bottom" align="left">4</td>
                  <td id="tc-81c1959c5367" rules="bottom" align="left">-2</td>
                  <td id="tc-007f2ecb34ec" rules="bottom" align="left">-2</td>
                  <td id="tc-bd427d7d1923" rules="bottom" align="left">0</td>
                  <td id="tc-06a298c877ad" rules="bottom" align="left">2</td>
                  <td id="tc-b716c169d384" rules="bottom" align="left">0</td>
                  <td id="tc-33423bc0e050" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-377f4871f74f">
                  <td id="tc-9785c42c5864" rules="bottom" align="left">0</td>
                  <td id="tc-4432ec9fd9c7" rules="bottom" align="left">0</td>
                  <td id="tc-74c40ffeff86" rules="bottom" align="left">-2</td>
                  <td id="tc-4107bc93baa0" rules="bottom" align="left">2</td>
                  <td id="tc-bbea2376e402" rules="bottom" align="left">0</td>
                  <td id="tc-5eba42d9f744" rules="bottom" align="left">-2</td>
                  <td id="tc-4fa0c0b6b67e" rules="bottom" align="left">-2</td>
                  <td id="tc-48bdf9b3d6cb" rules="bottom" align="left">0</td>
                  <td id="tc-6afdbe0527ec" rules="bottom" align="left">0</td>
                  <td id="tc-d1d18f2dee8f" rules="bottom" align="left">2</td>
                  <td id="tc-968c9e9f4a04" rules="bottom" align="left">2</td>
                  <td id="tc-b038e1302e50" rules="bottom" align="left">4</td>
                  <td id="tc-69171713cfb2" rules="bottom" align="left">2</td>
                  <td id="tc-eaae3ebe2477" rules="bottom" align="left">-2</td>
                  <td id="tc-78fa04b4ba09" rules="bottom" align="left">4</td>
                  <td id="tc-324444eb3992" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-fe7bae691a87">
                  <td id="tc-33147b953910" rules="bottom" align="left">0</td>
                  <td id="tc-9a9d039433fb" rules="bottom" align="left">0</td>
                  <td id="tc-30e22cf8894c" rules="bottom" align="left">-4</td>
                  <td id="tc-205f063eca92" rules="bottom" align="left">0</td>
                  <td id="tc-e41b420b4504" rules="bottom" align="left">4</td>
                  <td id="tc-07aad423d143" rules="bottom" align="left">4</td>
                  <td id="tc-d7987fb58f55" rules="bottom" align="left">0</td>
                  <td id="tc-862d668260b4" rules="bottom" align="left">4</td>
                  <td id="tc-276f3a6d5d3f" rules="bottom" align="left">0</td>
                  <td id="tc-250768df7b65" rules="bottom" align="left">0</td>
                  <td id="tc-cda387fc496d" rules="bottom" align="left">0</td>
                  <td id="tc-65c9e52666be" rules="bottom" align="left">0</td>
                  <td id="tc-c003a6f1f51a" rules="bottom" align="left">0</td>
                  <td id="tc-dc8c1cfbfa91" rules="bottom" align="left">0</td>
                  <td id="tc-ef6b59be5387" rules="bottom" align="left">0</td>
                  <td id="tc-a68608eb665b" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-7053abad32c3">
                  <td id="tc-c3770ebb9efb" rules="bottom" align="left">0</td>
                  <td id="tc-f4a91424dd6b" rules="bottom" align="left">0</td>
                  <td id="tc-70dbd0e3c6ed" rules="bottom" align="left">2</td>
                  <td id="tc-343d3b1a8c9a" rules="bottom" align="left">2</td>
                  <td id="tc-848207e0de24" rules="bottom" align="left">0</td>
                  <td id="tc-3b366d0b6033" rules="bottom" align="left">2</td>
                  <td id="tc-c0171d159d66" rules="bottom" align="left">-2</td>
                  <td id="tc-a7a9fdab05b7" rules="bottom" align="left">0</td>
                  <td id="tc-752ec4ffb270" rules="bottom" align="left">0</td>
                  <td id="tc-7c82d2c18e3e" rules="bottom" align="left">-2</td>
                  <td id="tc-51df1b0fe3bc" rules="bottom" align="left">-2</td>
                  <td id="tc-e218220696c8" rules="bottom" align="left">4</td>
                  <td id="tc-72e5ecf07411" rules="bottom" align="left">-2</td>
                  <td id="tc-62c27cd635dc" rules="bottom" align="left">2</td>
                  <td id="tc-7860d2340046" rules="bottom" align="left">0</td>
                  <td id="tc-e1440ee02e02" rules="bottom" align="left">4</td>
                </tr>
                <tr id="tr-bf7a986462aa">
                  <td id="tc-3d4c70ab7b7a" rules="bottom" align="left">0</td>
                  <td id="tc-96421a898cb3" rules="bottom" align="left">2</td>
                  <td id="tc-e508e7284b22" rules="bottom" align="left">-2</td>
                  <td id="tc-5b55206ce3b2" rules="bottom" align="left">0</td>
                  <td id="tc-5ab3e279ac4f" rules="bottom" align="left">-4</td>
                  <td id="tc-9c798634091e" rules="bottom" align="left">0</td>
                  <td id="tc-69854f0def3a" rules="bottom" align="left">-2</td>
                  <td id="tc-dfda6d49e33a" rules="bottom" align="left">2</td>
                  <td id="tc-c2ae9d364f62" rules="bottom" align="left">2</td>
                  <td id="tc-e69a9efdb375" rules="bottom" align="left">2</td>
                  <td id="tc-99bbc82a30b2" rules="bottom" align="left">-4</td>
                  <td id="tc-758d963dccd6" rules="bottom" align="left">0</td>
                  <td id="tc-a85dee3b84c8" rules="bottom" align="left">0</td>
                  <td id="tc-e75c1682fdd0" rules="bottom" align="left">-2</td>
                  <td id="tc-54bbbd95d109" rules="bottom" align="left">-2</td>
                  <td id="tc-a5021f7b2cfe" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-26852c8af0d9">
                  <td id="tc-f046ca27269c" rules="bottom" align="left">0</td>
                  <td id="tc-2c1b3638c792" rules="bottom" align="left">-2</td>
                  <td id="tc-ff20ee909e1c" rules="bottom" align="left">0</td>
                  <td id="tc-03c5081a9cc2" rules="bottom" align="left">2</td>
                  <td id="tc-197c355b266e" rules="bottom" align="left">0</td>
                  <td id="tc-4e1b05da9cb2" rules="bottom" align="left">-2</td>
                  <td id="tc-a6e13ee224e8" rules="bottom" align="left">0</td>
                  <td id="tc-95168cd299fd" rules="bottom" align="left">2</td>
                  <td id="tc-a8d5380d25b5" rules="bottom" align="left">2</td>
                  <td id="tc-287a539df787" rules="bottom" align="left">-4</td>
                  <td id="tc-b37886ed6157" rules="bottom" align="left">-2</td>
                  <td id="tc-1b73a20055ed" rules="bottom" align="left">0</td>
                  <td id="tc-d69ec95ffd0a" rules="bottom" align="left">-2</td>
                  <td id="tc-36f11c68f5b0" rules="bottom" align="left">0</td>
                  <td id="tc-fe9af6cc9975" rules="bottom" align="left">2</td>
                  <td id="tc-8cfe72153d42" rules="bottom" align="left">-4</td>
                </tr>
                <tr id="tr-b8451913fb19">
                  <td id="tc-063f9dc7341a" rules="bottom" align="left">0</td>
                  <td id="tc-059fb14b95a0" rules="bottom" align="left">-2</td>
                  <td id="tc-912b1c86da22" rules="bottom" align="left">2</td>
                  <td id="tc-60428b23704f" rules="bottom" align="left">-4</td>
                  <td id="tc-0c8aa2dd9b7c" rules="bottom" align="left">0</td>
                  <td id="tc-6262d76006c9" rules="bottom" align="left">0</td>
                  <td id="tc-9eab69d31115" rules="bottom" align="left">-2</td>
                  <td id="tc-12482a1b1ff6" rules="bottom" align="left">2</td>
                  <td id="tc-cf4ff495ece6" rules="bottom" align="left">-2</td>
                  <td id="tc-954e732e429b" rules="bottom" align="left">2</td>
                  <td id="tc-5704e342adcc" rules="bottom" align="left">0</td>
                  <td id="tc-b8945563f0d4" rules="bottom" align="left">0</td>
                  <td id="tc-f493801df5ee" rules="bottom" align="left">-4</td>
                  <td id="tc-73012a72eb5c" rules="bottom" align="left">-2</td>
                  <td id="tc-74aefb8130df" rules="bottom" align="left">2</td>
                  <td id="tc-6dbeda1fe866" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-0a03a15816bc">
                  <td id="tc-87491dac16b4" rules="bottom" align="left">0</td>
                  <td id="tc-ffe53048fc08" rules="bottom" align="left">-2</td>
                  <td id="tc-f7adcf753f92" rules="bottom" align="left">0</td>
                  <td id="tc-dc8a7b3fde31" rules="bottom" align="left">0</td>
                  <td id="tc-c9546bd83402" rules="bottom" align="left">-2</td>
                  <td id="tc-037af0b64b52" rules="bottom" align="left">2</td>
                  <td id="tc-643d6c528c1b" rules="bottom" align="left">-2</td>
                  <td id="tc-aa80e1c3fd9a" rules="bottom" align="left">0</td>
                  <td id="tc-93c7eb93d20d" rules="bottom" align="left">-4</td>
                  <td id="tc-6bf8ec21fe04" rules="bottom" align="left">-2</td>
                  <td id="tc-24182264d91d" rules="bottom" align="left">-2</td>
                  <td id="tc-b36418402f3f" rules="bottom" align="left">-2</td>
                  <td id="tc-4ac5c75c0672" rules="bottom" align="left">4</td>
                  <td id="tc-4a47c2ef6e58" rules="bottom" align="left">0</td>
                  <td id="tc-8b1f4ad675b1" rules="bottom" align="left">2</td>
                  <td id="tc-e5e63cd59308" rules="bottom" align="left">0</td>
                </tr>
                <tr id="tr-2c73e32b7899">
                  <td id="tc-162fa4df158d" rules="bottom" align="left">0</td>
                  <td id="tc-3b64bdfa0fff" rules="bottom" align="left">0</td>
                  <td id="tc-2a941911e6cd" rules="bottom" align="left">0</td>
                  <td id="tc-7c69e7336d85" rules="bottom" align="left">2</td>
                  <td id="tc-78bc558f9179" rules="bottom" align="left">-2</td>
                  <td id="tc-5d0f02324de6" rules="bottom" align="left">4</td>
                  <td id="tc-b8ad88c673d4" rules="bottom" align="left">2</td>
                  <td id="tc-820c7b60dccb" rules="bottom" align="left">-2</td>
                  <td id="tc-c9b791dbeea6" rules="bottom" align="left">2</td>
                  <td id="tc-6362aff03887" rules="bottom" align="left">2</td>
                  <td id="tc-baa956795ab5" rules="bottom" align="left">0</td>
                  <td id="tc-5849f618a4e0" rules="bottom" align="left">-2</td>
                  <td id="tc-b7fbf395e36c" rules="bottom" align="left">-2</td>
                  <td id="tc-1eead08ada1b" rules="bottom" align="left">0</td>
                  <td id="tc-0373e728d736" rules="bottom" align="left">4</td>
                  <td id="tc-b75cfe3ed42e" rules="bottom" align="left">0</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p id="p-52beb29d75b0"> </p>
          <p id="p-b3dd0e0bf08d">The maximum values found in the XOR distribution and the linear approximation tables for all SLEA ‎S-boxes are summarized in Table 5. The DPPmax is the same for all of the S-boxes, at 4/16=2^(-2), ‎and the maximum bias probability of ±4/16. ‎ </p>
          <table-wrap id="tw-45edbf2f5295" orientation="potrait" width="twocolumn" autobreak="true">
            <label>Table 5</label>
            <caption id="c-0ec2794d4800">
              <title id="t-0ad09170091e">Summaryof the non-linear properties of GOST block cipher S-boxes</title>
            </caption>
            <table id="t-f9312210c750" rules="rows">
              <colgroup/>
              <tbody id="ts-d4c540e51b7f">
                <tr id="tr-1fad8f57d136">
                  <td id="tc-5e417d5c5279" colspan="4" rules="bottom" align="left">S - Box of most recent version of GOST </td>
                </tr>
                <tr id="tr-85b564397f94">
                  <td id="tc-daf47db33605" rules="bottom" align="left">SLEA-Box</td>
                  <td id="tc-3d8ace1a5366" rules="bottom" align="left">GOST-Box</td>
                  <td id="tc-6936bcc9838c" rules="bottom" align="left">Dmax(XOR Dist. Table)</td>
                  <td id="tc-dbc4b11017a0" rules="bottom" align="left">Lmax(Linear App. Table)</td>
                </tr>
                <tr id="tr-3af1523619ec">
                  <td id="tc-6e7212740047" rules="bottom" align="left">S1</td>
                  <td id="tc-c5e455784496" rules="bottom" align="left">S3</td>
                  <td id="tc-0e7aad12109a" rules="bottom" align="left">4</td>
                  <td id="tc-0afb5a7823c3" rules="bottom" align="left">   ±4</td>
                </tr>
                <tr id="tr-f2e3b5aa5a29">
                  <td id="tc-8f5c153fe31a" rules="bottom" align="left">S2</td>
                  <td id="tc-4a0f2ab7e782" rules="bottom" align="left">S4</td>
                  <td id="tc-cb83110d56db" rules="bottom" align="left">4</td>
                  <td id="tc-bc36c079268d" rules="bottom" align="left">   ±4</td>
                </tr>
                <tr id="tr-3d152441b378">
                  <td id="tc-2fb38a1f50d5" rules="bottom" align="left">S3</td>
                  <td id="tc-220e06177e03" rules="bottom" align="left">S6</td>
                  <td id="tc-b5b2d07d9b84" rules="bottom" align="left">4</td>
                  <td id="tc-a59139ed65d9" rules="bottom" align="left">   ±4</td>
                </tr>
                <tr id="tr-adce6493640b">
                  <td id="tc-47348537b0c3" rules="bottom" align="left">S4</td>
                  <td id="tc-d2d5d9713c67" rules="bottom" align="left">S8</td>
                  <td id="tc-0dd03ba8d88a" rules="bottom" align="left">4</td>
                  <td id="tc-13d932bc2e50" rules="bottom" align="left">   ±4</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p id="p-614477c2aba8">The values of robustness for all of the SLEA S-boxes are calculated by applying equation 5 and are shown in Table 6. The results indicate that all of the S-boxes are approximately have the same robustness.</p>
          <table-wrap id="tw-239a5b81f3bc" orientation="potrait" width="twocolumn" autobreak="true">
            <label>Table 6</label>
            <caption id="c-b3fb93ac0503">
              <title id="t-27f91e79850a">Robustnessof GOST block cipher S-boxes</title>
            </caption>
            <table id="t-bcbc2172c2d3" rules="rows">
              <colgroup/>
              <tbody id="ts-399d1acbed51">
                <tr id="tr-a20789a29e36">
                  <td id="tc-cba7e2bfa39c" colspan="5" rules="bottom" align="left">S - Boxes of most recent version </td>
                </tr>
                <tr id="tr-1371640e3cb0">
                  <td id="tc-9a338b19a649" rules="bottom" align="left">SLEA-Box</td>
                  <td id="tc-d77b8a71366e" rules="bottom" align="left">GOST-Box</td>
                  <td id="tc-809370e3a267" rules="bottom" align="left"> </td>
                  <td id="tc-d8e577276bae" rules="bottom" align="left">L</td>
                  <td id="tc-aa65074ec27d" rules="bottom" align="left">RS</td>
                </tr>
                <tr id="tr-9a6149dbadca">
                  <td id="tc-d160def10c36" rules="bottom" align="left">S1</td>
                  <td id="tc-3fb1844a0875" rules="bottom" align="left">S3</td>
                  <td id="tc-a6366e31be35" rules="bottom" align="left">0</td>
                  <td id="tc-da10099418df" rules="bottom" align="left">4</td>
                  <td id="tc-5d1e328f43a7" rules="bottom" align="left">0.75</td>
                </tr>
                <tr id="tr-ec3da3b8f4fe">
                  <td id="tc-adeb9d34888c" rules="bottom" align="left">S2</td>
                  <td id="tc-bcc5a423116a" rules="bottom" align="left">S4</td>
                  <td id="tc-346acbccdc94" rules="bottom" align="left">0</td>
                  <td id="tc-01475c083246" rules="bottom" align="left">4</td>
                  <td id="tc-3fb181dff228" rules="bottom" align="left">0.75</td>
                </tr>
                <tr id="tr-a0381db9b51f">
                  <td id="tc-81e3584a32e5" rules="bottom" align="left">S3</td>
                  <td id="tc-d67623a43f6f" rules="bottom" align="left">S6</td>
                  <td id="tc-dd78c429e590" rules="bottom" align="left">0</td>
                  <td id="tc-34b5a82c73f4" rules="bottom" align="left">4</td>
                  <td id="tc-41eb655592a2" rules="bottom" align="left">0.75</td>
                </tr>
                <tr id="tr-5de1c9f4b441">
                  <td id="tc-ca665a011d8f" rules="bottom" align="left">S4</td>
                  <td id="tc-5d6fb75a8f1d" rules="bottom" align="left">S8</td>
                  <td id="tc-7f365a55e08c" rules="bottom" align="left">0</td>
                  <td id="tc-356e8d3e9d71" rules="bottom" align="left">4</td>
                  <td id="tc-643a20d74b00" rules="bottom" align="left">0.75</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p id="p-2525cc0fe834"> </p>
          <disp-formula>
            <label>5</label>
            <math xmlns="http://www.w3.org/1998/Math/MathML">
              <mi>R</mi>
              <mo> </mo>
              <mo>=</mo>
              <mo>(</mo>
              <mn>1</mn>
              <mo>-</mo>
              <mi>N</mi>
              <mo>/</mo>
              <msup>
                <mn>2</mn>
                <mi>n</mi>
              </msup>
              <mo>)</mo>
              <mo>(</mo>
              <mn>1</mn>
              <mo> </mo>
              <mo>-</mo>
              <mo> </mo>
              <mi>L</mi>
              <mo>/</mo>
              <msup>
                <mn>2</mn>
                <mi>n</mi>
              </msup>
              <mo>)</mo>
            </math>
          </disp-formula>
        </sec>
      </sec>
    </sec>
    <sec>
      <title id="t-41627371ae7c">Implementation Considerations</title>
      <p id="p-c29b92e7edf7">As shown before, SLEA is designed to facilitate both software and hardware implementation. ‎Hardware implementation achieves high speed while the software implementation has the advantage of ‎flexibility and low cost. ‎<x>
</x>The design principles for software implementation are stated as follows: ‎</p>
      <list list-type="bullet">
        <list-item id="li-03fd7aee5a26">
          <p><bold id="s-d5bebef4786c"><italic id="e-76aecb446d2c">Utilization of sub-blocks</italic></bold><italic id="e-76aecb446d2c">:</italic> Cipher operations should operate on sub-blocks that are natural for software, such ‎as 8, 16, or 32-bits. SLEA can achieve that easily because it can be adapt to use 32 -bits sub-blocks. ‎</p>
        </list-item>
        <list-item id="li-144edda7b680">
          <p><bold id="s-8f33175ba60f"><italic id="e-b489efb11fb7">Use simple operations: </italic></bold>Cipher operations should be easily programmed using addition, subtraction, ‎shifting,complement,  Xoring and so on. The elements of SLEA meet this requirement as well. ‎</p>
        </list-item>
      </list>
      <p id="p-8423d834d5b9">At the same time the design principles for hardware implementation are stated as follows:‎</p>
      <list list-type="bullet">
        <list-item id="li-e097ad9ddad1">
          <p><bold id="s-8c13f159c6f9"><italic id="e-b6bbb47ca9c7">Similarity of encryption and decryption: </italic></bold>Encryption should differ only in the way of using the key, so ‎that the same device can be used for both encryption and decryption. SLEA has a structure that ‎satisfies this requirement.‎</p>
        </list-item>
        <list-item id="li-5c00120e0303">
          <p><bold id="s-3e394f467555"><italic id="e-0a5f97a33a13">Using a compact S-boxes: </italic></bold>it can save the memory space and the implementation costs.‎</p>
        </list-item>
        <list-item id="li-765bdafb7fd8">
          <p><bold id="s-912c9d840eec"><italic id="e-0917bd974e43">Regular structure:</italic></bold> The cipher should have a regular structure to facilitate VLSI implementation. SLEA ‎is constructed from only one basic modular building blocks repeated multiple times.‎</p>
        </list-item>
      </list>
    </sec>
    <sec>
      <title id="t-b9c75093733b">SLEA Analysis</title>
      <p id="p-e8ce278b0e2d">In this section, the characteristics of the SLEA relate to its cryptographic strength are illustrated as follow,‎</p>
      <list list-type="bullet">
        <list-item id="li-892875e5127f">
          <p><bold id="s-d4b29a3cc3b4"><italic id="e-c6892d3569d6">Block length:</italic></bold> The block length should be long enough to deter statistical analysis.  This is valid for ‎SLEA as well where 64-bit block is used. ‎</p>
        </list-item>
        <list-item id="li-8bb082428377">
          <p><bold id="s-b611dc47d575"><italic id="e-ea241503c360">Key Length: </italic></bold>The key length should be long enough to effectively prevent exhaustive key searches. With length ‎‎256-bits, SLEA seems to be secure in this area far into the future.‎</p>
        </list-item>
        <list-item id="li-b49ff0bb516e">
          <p><bold id="s-b656946d4822"><italic id="e-427de6efbf8a">Confusion:</italic></bold> The ciphertext should depend on the plaintext and key in a complicated and involved way. ‎The objective is to complicate the determination of how the statistics of the ciphertext depend on the ‎statistics of the plaintext. SLEA achieves this goal by using the four 4-bits S-boxes S1, S2, S3 and S4 ‎and by mixing the different operations with the signal.‎</p>
        </list-item>
        <list-item id="li-1dd81c3f603e">
          <p><bold id="s-171ab116742d"><italic id="e-8438dcfc6de3">Diffusion:</italic></bold> Each plaintext bit should influence every ciphertext bit, and each key bit influence every ‎ciphertext bit, the spreading out of the single plaintext bit over many ciphertext bits hides the statistical ‎structure of the plaintext. In SLEA, the diffusion is provided by the four 4-bits S-boxes and the basic building ‎block of the algorithm, known as the Subtraction/Complement/Xor/Addition (SCXA) structure as shown ‎in Fig. 4 besides interchanging the two halves of the plaintext every round. This structure takes two ‎‎(n/2)-bits values derived from the plaintext as input and two (n/2)-bits sub-keys derived from the key and ‎produces (n/2)-bits output. Each output bit of the first round depends on every bit of the plaintext-derived ‎input and on every bit of the sub-keys. This particular structure is repeated m times in the algorithm, providing ‎very effective diffusion. ‎</p>
        </list-item>
      </list>
      <p id="p-9fa6018f088c"/>
      <fig id="f-053b31b6a856" orientation="potrait" width="twocolumn" fig-type="graphic" position="anchor">
        <graphic id="g-c27f0b3221c6" xlink:href="https://typeset-prod-media-server.s3.amazonaws.com/article_uploads/dd6b9c49-31a2-4959-ad6e-0a17226f3bcd/image/1d992c45-5dfb-4115-8d28-ad2e07406f27-ufig4.png"/>
        <label>Figure 4 </label>
        <caption id="c-58ad4fc0f82b">
          <title id="t-6fe3ddcab30c">Subtraction/Complement/XOR/Addition(SCXA)  </title>
        </caption>
      </fig>
      <p id="p-3ad6c55ced17"/>
    </sec>
    <sec>
      <title id="t-5d2d919bd97a">Conclusions<bold id="s-ff6072a53e2c"/></title>
      <p id="p-66e0af2c8b52">A proposed cryptography algorithm entitled “SLEA” has been introduced in this paper. The goal of our proposed algorithm is to provide a practical and secure cipher for low-resource applications. The benefit of the proposed SLEA its simplicity in terms of the used functions as well as the compact S-boxes that have been used. In addition, SLEA could be very beneficial to the wireless networks especially in networks with limited resources such as WSNs. </p>
    </sec>
    <sec>
      <title id="t-d4e7880c9c8e">
        <bold id="s-b955a361de0a">References</bold>
      </title>
      <list list-type="ordered">
        <list-item id="li-b06b7905c442">
          <p>Atzori, L., Iera, A. &amp; Morabito, G. (2010). The internet of things: a survey. <italic id="e-460506f5c8d2">Comput Netwok,</italic> <italic id="e-7d243cecd2f6">54</italic>(15), 2787–2805.</p>
        </list-item>
        <list-item id="li-815e46a1ca33">
          <p>Gubbi, J., Buyya, R., Marusic, S. &amp; Palaniswami, M. (2013). Internet of things (iot): A vision, architectural elements, and future directions. <italic id="e-48178fcacd9f">Future Generation Computer Systems,</italic> <italic id="e-91bae70b8668">29</italic>(7), 1645–1660. </p>
        </list-item>
        <list-item id="li-95a14f854901">
          <p>Want, R., &amp; Dustdar, S. (2015). Activating the internet of things. <italic id="emphasis-5">IEEE</italic> <italic id="emphasis-6">Computer Society,</italic> <italic id="emphasis-7">48</italic>(9), 16–20.</p>
        </list-item>
        <list-item id="li-8509e99a0cdd">
          <p>Mariona, J., Hallman, R., Kline, M., Miguel, J., Major, M. &amp; Kerr, L. (2016). Security in the industrial internet of things. <italic id="emphasis-8">International Conference on Internet of Things and Big Data.</italic> At Rome, Italy</p>
        </list-item>
        <list-item id="li-30c6c84ec6a1">
          <p>Suo, H., Wan, J., Zou, C., &amp; Liu., J. (2012). Security in the internet of things: A Review. <italic id="emphasis-9">IEEE International Conference on Computer Science and Electronics Engineering</italic>. </p>
        </list-item>
        <list-item id="li-0d90f8eb2db0">
          <p>Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., &amp; Wagner, D. (2016). Smart locks: Lessons for securing commodity internet of things devices. <italic id="emphasis-10">The</italic> <italic id="emphasis-11">11<sup id="superscript-1">th</sup> ACM on Asia Conference on</italic> <italic id="emphasis-12"> </italic><italic id="emphasis-13">Computer and Communications Security</italic> .</p>
        </list-item>
        <list-item id="li-fb675b392240">
          <p>Nation<italic id="e-ca4281576dc5">a</italic>l Bureau of Standards, U.S. Department of Commerce. (1977, January). Data Encryption Standard. <italic id="emphasis-14">Federal Information Processing Standard (FIPS).</italic>  </p>
        </list-item>
        <list-item id="li-01d5f5c43031">
          <p>Stallings, W. (2009). <italic id="emphasis-15">Cryptography and network security</italic>: <italic id="emphasis-16">Principals and Practices. </italic><italic id="emphasis-17"> </italic></p>
        </list-item>
        <list-item id="li-6c2a9def4b78">
          <p>Lai, X. &amp; Massey, J. (1990). <italic id="emphasis-18">A proposal for a new block encryption standard</italic>. <italic id="emphasis-19">In Proceedings of the EUROCRYPT 90 Conference,</italic> 389-404.</p>
        </list-item>
        <list-item id="li-f17f830a45ec">
          <p>Schneier. (1994, April). The Blowfish encryption algorithm<italic id="emphasis-20">.</italic> <italic id="emphasis-21">Dr. Dobb's Journal of Software Tools,</italic> <italic id="emphasis-22">19</italic>(4), 38-40.</p>
        </list-item>
        <list-item id="li-ddcb5f4b720e">
          <p>Daemen &amp; Rijmen, V. (1999, September 3). AES Proposal: Rijndael, AES algorithm submission. <italic id="emphasis-23">International Journal of Computer Applications.</italic> </p>
        </list-item>
        <list-item id="li-a762bc57a911">
          <p>Nechvatal, James., Barker, Elaine., Bassham, Lawrence., Burr, William., Dworkin, Morris., Foti, James., &amp; Roback, Edward. (2001, May– June). Report on the Development of the Advanced Encryption Standard (AES). <italic id="emphasis-24">International Journal of Computer Applications,</italic> 106 (3).</p>
        </list-item>
        <list-item id="li-bb0158675a15">
          <p>Coppersmith, D. (1994, May). The Data Encryption Standard (DES) and Its Strength Against Attacks. <italic id="emphasis-25">IBM Journal of Research and Development, 243 - 250.</italic> </p>
        </list-item>
        <list-item id="li-5fb2897f3454">
          <p>Biham, E., Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. <italic id="emphasis-26">Journal of Cryptology,</italic> <italic id="emphasis-27">4</italic>(l).</p>
        </list-item>
        <list-item id="li-9d39ddade15e">
          <p>Leander, G., Paar, C., Poschmann, A., Schramm, K. (2007, March). New Lightweight DES Variants. Fast Software Encryption 2007, <italic id="emphasis-28">LNCS, Springer-Verlag,</italic> 26.-28. </p>
        </list-item>
        <list-item id="li-1b41d68d39cf">
          <p>Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., … Vikkelsoe, C. (2007, September 10). PRESENT: An Ultra-Lightweight Block Cipher. <italic id="emphasis-29">International Workshop on Cryptographic Hardware and Embedded Systems,</italic> Vienna, Austria: LNCS, Springer-Verlag. </p>
        </list-item>
        <list-item id="li-3c450caf7edf">
          <p>Korte, T., &amp; Silverlight. (2009, February). <italic id="emphasis-30">Implementation of PRESENT. M.sc. thesis, Embedded Security Group.</italic> Ruhr University Bochum. </p>
        </list-item>
        <list-item id="li-782604114111">
          <p>Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., &amp; Wingers, L. (2013). The SIMON and SPECK Families of Lightweight Block Ciphers. <italic id="emphasis-31">IACR Cryptology ePrint Archive.</italic><italic id="emphasis-32"> </italic></p>
        </list-item>
        <list-item id="li-b02626a747ce">
          <p>Rivest, R.L. (1994, December 14–16). The RC5 Encryption Algorithm. <italic id="emphasis-33">Second International Workshop on Fast Software Encryption (FSE 1994), </italic> Leuven, Belgium: LNCS 1008. </p>
        </list-item>
        <list-item id="li-700f0c2551b3">
          <p>Wheeler, D.J., &amp; Needham, R.M. (1994, December 14–16). TEA, A Tiny Encryption Algorithm. Proc. <italic id="emphasis-34">Second International Workshop on Fast Software Encryption (FSE 1994),</italic> Leuven, Belgium: LNCS <italic id="emphasis-35">1008</italic>, 363-366.</p>
        </list-item>
        <list-item id="li-874c4bc00031">
          <p>Christophe, De Canni`ere. (2005). GOST article. <italic id="emphasis-36">Encyclopedia of Cryptography and Security,</italic> 242-243. </p>
        </list-item>
        <list-item id="li-10a89a23121b">
          <p>Courtois, Nicolas, T., Miształ, Michał. (2011). Differential cryptanalysis of GOST . Cryptology ePrint Archive, from http: //eprint.iacr.org/2011/312.</p>
        </list-item>
        <list-item id="li-69c6579ed903">
          <p>Courtois, Nicolas T. (2012). An improved differential attack on full GOST. <italic id="emphasis-37">Cryptology ePrint Archive,</italic> from http: // eprint.iacr.org/2012/138. </p>
        </list-item>
        <list-item id="li-631e1a63e159">
          <p>Seberry, Jennifer., Zhang, Xian-Mo., Zheng, Yuliang. (1993, August 10). Systematic generation of cryptographically robust s-boxes. <italic id="emphasis-38">The First ACM Conference on Computer and Communications Security.</italic> New York, USA.</p>
        </list-item>
      </list>
      <p id="p-7cc6f39536a0"/>
      <p id="p-9e7947f01d8a"/>
      <p id="p-608a86d69b8b"/>
    </sec>
  </body>
  <back>
    <ref-list id="470725">
      <title>References</title>
    </ref-list>
  </back>
</article>
