RC5 Performance Enhancement Based on Parallel Computing
DOI: http://dx.doi.org/10.62527/joiv.9.1.2675
Abstract
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substantial improvement of 59.90% is observed for data files sized at 1500000kb. Partitioning larger files notably reduces encryption time, while smaller files experience marginal benefits. Certain file types benefit from both strategies. Evaluation metrics include encryption execution time and throughput, consistently demonstrating ERC5's superiority over the original RC5. Moreover, ERC5 exhibits reduced power consumption and heightened throughput, highlighting its multifaceted benefits in resource-constrained environments. ERC5 is developed and tested on various file types and sizes to evaluate encryption speed, power consumption, and throughput. ERC5 significantly improves encryption speed across different file types and sizes, with notable gains for audio, image, and large data files. While partitioning smaller files only slightly improves encryption time, larger files partitioning yields faster results. Future research could explore ERC5 optimizations for different computing environments, its integration into real-time encryption scenarios, and its impact on other cryptographic operations and security protocols.
Keywords
Full Text:
PDFReferences
Y. A. Birgani, S. Timarchi, and A. Khalid, “Ultra-lightweight FPGA-based RC5 designs via data-dependent rotation block optimization,” Microprocess. Microsyst., vol. 93, p. 104588, 2022. doi: 10.1016/j.micpro.2022.104588.
P. Velmurugan, S. S. Sridhar, and E. Gotham, “An advanced and effective encryption methodology used for modern IoT security,” Mater. Today Proc., vol. 81, pp. 389–394, 2023. doi: 10.1016/j.matpr.2021.03.424.
M. Y. Hasan and D. J. Kadhim, “Efficient energy management for a proposed integrated internet of things-electric smart meter (2IOT-ESM) system,” J. Eng., vol. 28, no. 1, pp. 108–121, 2022, doi.org/10.31026/j.eng.2022.01.08.
M. M. Abed and M. F. Younis, “Developing load balancing for IoT - Cloud computing based on advanced firefly and weighted round robin algorithms,” Baghdad Sci. J., vol. 16, no. 1, pp. 130–139, 2019, doi: 10.21123/bsj.2019.16.1.0130.
E. B. Villanueva, R. P. Medina, and B. D. Gerardo, “An enhanced RC5 (ERC5) algorithm based on simple random number key expansion technique,” in 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), IEEE, 2018, pp. 134–138, doi: 10.1109/ISCAIE.2018.8405458.
Y. M. Hameed and N. H. M. Ali, “Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption,” Iraqi J. Sci., pp. 388–401, 2019, doi: 10.24996/ijs.2019.60.2.19.
R. Shahzadi, S. M. Anwar, F. Qamar, M. Ali, and J. J. Rodrigues, “Chaos based enhanced RC5 algorithm for security and integrity of clinical images in remote health monitoring. IEEE Access, 7: 52858-52870.” 2019, doi: 10.1109/ACCESS.2019.2909554.
A. Soboń, M. Kurkowski, and S. Stachowiak, “Complete SAT based Cryptanalysis of RC5 Cipher,” J. Inf. Organ. Sci., vol. 44, no. 2, pp. 365–382, 2020, doi: 10.31341/jios.44.2.10.
T. Zhovnovach, A. Sagun, V. Khaidurov, H. Martyniuk, and T. Scherbak, “MODIFICATION OF RC5 CRYPTOALGORYTHM FOR ELECTRONIC DATA ENCRYPTION SYSTEMS.,” Ukr. Sci. J. Inf. Secur., vol. 25, no. 3, 2019.19, doi: 10.18372/2225-5036.25.14458.
M. B. Qureshi et al., “Encryption techniques for smart systems data security offloaded to the cloud,” Symmetry (Basel)., vol. 14, no. 4, p. 695, 2022. doi:10.3390/sym14040695.
J. B. Awotunde, A. O. Ameen, I. D. Oladipo, A. R. Tomori, and M. Abdulraheem, “Evaluation of four encryption algorithms for viability, reliability and performance estimation,” Niger. J. Technol. Dev., vol. 13, no. 2, pp. 74–82, 2016. doi:10.4314/njtd.v13i2.5.
E. B. Villanueva, B. D. Gerardo, and R. P. Medina, “Implementation of the Enhanced RC5 (ERC5) Algorithm in an RFID-based Payment Scheme,” in Proceedings of the 2nd International Conference on Business and Information Management, 2018, pp. 6–10, doi: 10.1145/3278252.3278261.
H. Khazaei, C. K. Wei, and S. K. Bin Sulaiman, “The Application of IoT on Consumer Behaviour and Decision-Making Process,” Int. J. Adv. Sci. Comput. Eng., vol. 4, no. 3, pp. 188–192, 2022. doi:10.30630/ijasce.4.3.93.
B. A. Hameedi, M. M. Laftah, and A. A. Hattab, “Data Hiding in 3D-Medical Image.,” Int. J. Online Biomed. Eng., vol. 18, no. 3, 2022. doi:10.3991/ijoe.v18i03.28007.
N. A. Ali, A. M. S. Rahma, and S. H. Shaker, “Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator.,” Int. J. Electr. Comput. Eng., vol. 12, no. 6, 2022. doi:10.11591/ijece.v12i6.pp6486-6495.
D. M. Satyavathi, B. V. Mala, C. V. Vamsi, C. C. Chiranjeevi, and C. N. Neeraj, “Real-Time Hidden Data Transmission Using Lora,” Int. J. Adv. Sci. Comput. Eng., vol. 4, no. 2, pp. 130–137, 2022. doi:10.36713/epra11016.
M. Hadi and M. Najm, “Introduction to ChatGPT: A new revolution of artificial intelligence with machine learning algorithms and cybersecurity,” Sci. Arch, vol. 4, pp. 276–285, 2023. doi:10.47587/sa.2023.4406.
L. Faridah, A. U. Rahayu, R. N. Shopa, H. Sulastri, N. Hiron, and F. M. S. Nursuwars, “Caribi Mobile Application Based on Radio Frequency Identification (RFID) for Internet of Things (IoT),” Int. J. Adv. Sci. Comput. Eng., vol. 4, no. 3, pp. 203–209, 2022. doi:10.30630/ijasce.4.3.98.
N. A. Taha, Z. Qasim, A. Al-Saffar, and A. A. Abdullatif, “Steganography using dual tree complex wavelet transform with LSB indicator technique,” Period. Eng. Nat. Sci., vol. 9, no. 2, pp. 1106–1114, 2021. 1106. doi:10.21533/pen.v9i2.2060.
A. Hussein and T. B. Kareem, “Proposed Parallel Algorithms to Encryption Image Based on Hybrid Enhancement RC5 and RSA,” in 2019 International Engineering Conference (IEC), IEEE, 2019, pp. 101–106, doi: 10.1109/IEC47844.2019.8950593.
D. Prakash, “FPRC5: Improving the Data Security using Format PreservedRC5 Block Cipher Algorithm in Credit Card Application,” in 2021 6th International Conference on Communication and Electronics Systems (ICCES), IEEE, 2021, pp. 775–785, doi: 10.1109/ICCES51350.2021.9488936.
A. S. Jamil and A. M. S. Rahma, “Image Encryption Based on Multi-Level Keys on RC5 Algorithm,” Int. J. Interact. Mob. Technol., vol. 16, no. 17, pp. 101–115, 2022, doi: 10.3991/ijim.v16i17.34335.
O. S. Faragallah, A. I. Sallam, and H. S. El-Sayed, “Visual protection using rc5 selective encryption in telemedicine,” Intell. Autom. Soft Comput., vol. 31, no. 1, pp. 177–190, 2022, doi: 10.32604/IASC.2022.019348.
R. A. Muhajjar, N. A. Flayh, and M. Al-Zubaidie, “A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments,” Electron., vol. 12, no. 4, pp. 1–20, 2023, doi: 10.3390/electronics12041011.
H. M. Yousif and S. M. Hameed, “Review of Challenges and Solutions for Genomic Data Privacy-Preserving,” Iraqi J. Sci., pp. 4729–4746, 2023. doi:10.24996/ijs.2023.64.9.35.
A. Abidi, A. Sghaier, M. Bakiri, C. Guyeux, and M. Machhout, “Statistical analysis and security evaluation of chaotic RC5-CBC symmetric key block cipher algorithm,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 10, pp. 533–538, 2019, doi: 10.14569/ijacsa.2019.0101070.
V. K. Raj, H. Ankitha, N. G. Ankitha, and L. S. Kanthi Hegde, “Honey encryption based hybrid cryptographic algorithm: A fusion ensuring enhanced Security,” Proc. 5th Int. Conf. Commun. Electron. Syst. ICCES 2020, no. Icces, pp. 490–494, 2020, doi: 10.1109/ICCES48766.2020.09137849.
H.S. Gill, " Selection of Parameter ‘r’ in RC5 Algorithm on the basis of Prime Number, Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 – 08 March, 2014 DOI: 10.1109/RAECS.2014.6799519.
H. Alamleh, M. Gogarty, D. Ruddell, and A. A. S. Alqahtani, “Securing the Invisible Thread : A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags,” pp. 1–10. (padding)
B. A. Buhari,A. A. Obiniyi, k. Sunday, S. Shehu,“Performance Evaluation of Symmetric Data Encryption Algorithms : AES and Blowfish,” vol. 6272, pp. 407–414, 2019, doi: 10.36348/SJEAT.2019.v04i10.002.