International Journal of Computer Science and Communication Security (IJCSCS)
The Metamorphic-key-hopping GOST cipher is a metamorphic cipher with a key hopping technique applying a function that uses four bit-balanced operations. It utilizes a key hopping that depends on the packet power t to alternate the keys. The function operations depend on what is known as the Crypto Logic Unit (CLU). These operations are: XOR, INV, ROR, NOP for bitwise xor, invert, rotate right and no operation respectively. The key hopping technique is called Power Based Key Hopping (PBKH). The Crypto Logic Unit (CLU) replaces the adder CM2, previously used in the well-known GOST cipher, and the power based key hopping replaces the key scheduling process.