<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Improved Secure Stream Cipher for Cloud Computing</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>European University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kyiv College of Communication</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Scientific Cyber Security Association</institution>
          ,
          <addr-line>Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>Aktau</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Today cloud services have revolutionized the way we store and share different data. At the same time, most of the data are unsecured and vulnerable to various cyberattacks. In this paper cloud services concept and mechanisms of their work were considered. The cryptographic encryption algorithms used in cloud services were analyzed as well as comparative analysis of most popular up-to-date cloud services Wuala, DropBox and Google Drive was carried out. As the result of analysis, the advantages and the weakest places of each cloud services were defined. Besides that, in this work Google Drіve work scheme and data protection in the cloud service were presented. The main disadvantage of cipher RC4-128, which is used in this cloud service, is identified. After this improved stream cipher based on RC4-128 has been developed. It contains additional byte transformations in the PRN formation algorithm, an additional PRN and a new incoming message encryption algorithm using the generated threads. As a result, these solutions provide the cryptographic security of the proposed stream cipher. Experimental study of improved stream cipher for cloud services was carried out. It was focused on data encryption speed research and statistical testing using the standardized NIST STS technique.</p>
      </abstract>
      <kwd-group>
        <kwd>cloud computing</kwd>
        <kwd>cloud services</kwd>
        <kwd>cloud security</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>cryptography</kwd>
        <kwd>stream cipher</kwd>
        <kwd>algorithm</kwd>
        <kwd>encryption</kwd>
        <kwd>PRNG</kwd>
        <kwd>RC4</kwd>
        <kwd>NIST STS</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        In contemporary information and communication technology (ICT) world,
cloudbased environments have been in active use for a long time: both on the Internet and
across businesses. The potential for freely scalable technology allows not only to use
direct-purpose information products, but also extending the administration and
Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
maintenance of user-generated data, their processing and own funds usage in the field
of cloud technologies [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Cloud technology topic is becoming wider. Contemporary scientific and practical
conferences are devoted to further development and ways of building new
infrastructure of the state, new technological solutions for ICT implementation. Cloud
technologies are the basic infrastructure of the third generation, which allows to create
powerful ICT with a new architecture and capabilities. According to the forecasts of the
leading IT consulting companies in the world, the rapid improvement and spread of
cloud computing will completely change the IT industry development in the coming
years and will have a significant impact on other important spheres of human life.</p>
      <p>
        The essence of “cloud” technologies [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] is to provide end users with remote
dynamic access to computing resources, services and applications (including
information and operating systems, server software, etc.) over the Internet or through a
corporate network (Fig. 1 [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]). The tendency of hosting sphere development and
necessity for people to use public resources was defined by the emergent need for new
software and information digital services which could be managed from the inside but
which would be more economical and efficient.
      </p>
      <p>
        Using “cloud” technologies can not only reduce the cost of physical equipment, but
also massively combine data with their subsequent protection, ability to work
remotely with the enterprise information system and personalize “cloud” core for the needs
of the company. But “cloud” technologies have several disadvantages. The main one
is the threat to information security [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. According to standards, described in work
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], cloud security means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction in order to
provide integrity, confidentiality and availability in cloud services. In a highly
competitive environment, companies are most afraid of: data leaks from the “cloud”
provider network due to data interception, loss of control over data and applications,
inability to destroy data, insider action by the provider or other “cloud” users. For
protection it can be used data encryption or depersonalization. And not only the data
stored with the provider, but also the channel of communication with it should be
encrypted. Therefore, the development of really persistent data encryption algorithms
as well as improving existing information security methods in cloud services are very
relevant in our time and still actual in future during 5G-6G implementing.
      </p>
      <p>The main purpose of the study is to provide cryptographic security in cloud
services without reducing performance by improving stream cipher.</p>
    </sec>
    <sec id="sec-2">
      <title>Up-to-date Cloud Services Review</title>
      <p>
        Cloud services are the latest type of networking services that enable virtual media
information to extend the hardware and software resources of a user's computer
device. The cloud services emergence has become possible during development process
of cloud computing technologies, which are implemented under the conditions of
dynamic large-scale access to distributed external network resources. Providing such
access as a separate service remains a type of cloud service [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ].
      </p>
      <p>Cloud services are usually provided on the Internet using modern Internet
browsers. Cloud services utilize virtual machines that operate in large datacenters and
replace physical personal computers and servers. The main difference from the usual
use of software in cloud services is that the user can combine the internal resources of
his computer device and the software resources provided to him as an online service.
During this user has full access to managing his own data, but cannot control the
operating system or software base through which this work is done.
2.1</p>
      <sec id="sec-2-1">
        <title>DropBox Storage Service [5]</title>
        <p>Login and registration. For registration and login, it is used secure communication
channel (TLS). Registration can be done on the website or during client installation.
During registration on the website the user has to enter his first and last name
(arbitrary lines), email address and password. One email address can only be associated
with one account. During registration, a minimum password length of at least six
characters is imposed; a maximum limit is not set. In addition, no email address
should be used as a password. During registration on the website DropBox provides a
hint of the password quality, but accepts weak passwords. The registration process
during client installation is slightly different: the client application does not have a
password strength indicator and the user has to repeat the password. When entering a
previously used address, a corresponding message is displayed. When first logged in
through a client app, the user enters an email address and password. After passing the
authentication, the security token is transmitted to the server and stored on the client
side for further user authentication. DropBox does not send an activation message to
the email immediately after registration, it only happens after trying to get the first
URL to share the file, so the user can use the new account as soon as fill in the
registration form. In case of a failed login attempt, DropBox informs the user that one
element of the login / password pair is incorrect but does not specify which one.</p>
        <p>If a user has lost his password, Dropbox sends a message to the user's registered
email. This email contains the URL of a secure web page for entering a new
password. Dropbox prevents password hijacking by temporarily blocking your account
after many unsuccessful attempts to sign in for a specified period of time. Dropbox
has the ability to use two-factor authentication. This option can be enabled in profile
settings. In can be used one-time access codes that can be received on a mobile phone.
It is also possible to use barcodes using Tіme Based One Tіme Password mobile
applications.</p>
        <p>Secure communication channel (SCC). During the DropBox analysis, the principle
of securing communication channel between the client and the server was considered.</p>
        <p>SCC formation protocol – TLS.</p>
        <p>Message authentication algorithm – AES_256_СBС (SHA1).</p>
        <p>Key agreement algorithm – EСDHE_RSA (2048 bit).</p>
        <p>Data storage security. DropBox uses AES-256 to encrypt data stored on servers.
This data will not be encrypted on the client side, instead DropBox encrypts the data
after booting on the server side using its own encryption key. Since DropBox encrypts
data on the server, user can not be sure in data privacy.</p>
        <p>Data encryption algorithm –AES-256.</p>
        <p>Data encryption key possession – the key is owned by the provider.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Google Drive Storage Service [5,6]</title>
        <p>Login and registration. A SCC is used to register and log in. New accounts can be
created on a Google page. To use the service must have a Google account, which is
the same for all services and email address tied to Gmail. During registration, the user
must be sure to provide first and last name, gender, birth date, come up with a unique
email address and enter password twice. Also need to enter information from the
image. One email address can be associated with one account. To create a Google
Account, you must select a password, which include at least 8 characters, but not more
than 100 characters. In passwords can be used Latin letters (both large and small: A-Z,
a-z), numbers (0-9) and punctuation marks. The password can consist of only one
character’s group. When creating a password, the system provides a password quality hint.
Google also rejects common passwords. Thus, weak passwords are not accepted. Since
the login is unique to all Google applications – no additional signup confirmation is
required. If unsuccessful attempt to log in, Google notifies the user that one element of
the pair login / password is not correct, but does not specify what kind of. If a user
forgets his password, he gets two possible ways to set a new password:
 a secure page for resetting user’s password, URL sent by mail;
 using a code that is sent to a mobile phone via a short message or can be
communicated during a phone call.</p>
        <p>Google prevents brute force passwords using mandatory requirements Input
characters from the image after a series of failed login attempts in service. Google has the
ability to use two-factor authentication, this option can be enabled in the profile
settings. It is used one-time access codes that can be send on mobile phone.</p>
        <p>SCC. During the analysis of Google Drive, the security principle for
communication channel between client and server was considered.</p>
        <p>SCC formation protocol – TLS.</p>
        <p>Message authentication algorithm – RС4_128 (SHA1).</p>
        <p>Key agreement algorithm – EСDHE_EСDSA (256 bit).</p>
        <p>Data storage security. Google Drive does not use server-side data encryption.
2.3</p>
      </sec>
      <sec id="sec-2-3">
        <title>Wuala Storage Service [7]</title>
        <p>Login and registration. A SCC is used to register and log in. New accounts can only
be created using the Wuala App. During registration a user must provide a unique
name, email address and password. A single email address can be associated with
multiple accounts. Only minimum lengths of at least six characters are imposed on the
password, no maximum limit is set. Wuala provides hint about password quality
during registration, but does not reject weak passwords. Wuala does not send an
activation message to the email to confirm the fact of registration. In case of unsuccessful
login attempt, Wuala informs the user that one or both of the elements of the login /
password pair is incorrect but does not specify which one. Passwords are not stored
on Wuala servers, so the ability to recover a lost password is not available.</p>
        <p>Wuala provides optional password hint functionality. The password hint can be
used for a single username or email address and will be sent to a registered email
address. If there are multiple accounts registered with the same email address –
multiple emails will be sent, one for each account that has a password hint. The password
hint feature allows to collect information about already registered usernames and
email addresses. There are no restrictions on the number of failed login attempts.
Two-factor authentication is not currently implemented in Wuala.</p>
        <p>SCC. The Wuala SCC uses its own client-server communication protocol rather
than standardized and well-known SSL / TLS. According to Wuala press releases,
integrity checks are being used to protect data during transmission, but no detailed
documentation on mechanisms and protocols has been published. In conjunction with
the convergent encryption schemes used by Wuala, the lack of encryption during
transmission allows attackers to receive messages being transmitted and to attempt
information-gathering attacks.</p>
        <p>SCC formation protocol is absent.</p>
        <p>Message authentication algorithm – AES_256 (SHA1)
Key agreement algorithm – DHE_RSA (2048 bit)</p>
        <p>Data storage security. The idea behind Wuala encryption is to have an unreliable file
system whose security is ensured by cryptographic methods. Used scheme is an
implementation of directory tree structure for cryptographic file system called Сryptree.</p>
        <p>Trust is based on a symmetrical root key that is obtained from a user's password.
Wuala calculates the individual keys for each directory and the individual keys for
each file. They all are output through the root key. They can be provided to partners
for the purpose of data exchange. Wuala uses converged encryption schemes. This
means that key to encrypt the file is derived from its hash value.</p>
        <p>The most important properties of convergent encryption schemes are:
1) Identical plaintexts are encrypted into identical crypto texts, regardless of user;
2) Server cannot decrypt the crypto texts without having a copy of the plaintext.</p>
        <p>The first property ensures the implementation of encrypted data deduplication
feature. The second property protects documents that are unique to the user, such as
selfwritten works, unpublished technical reports, etc.</p>
        <p>Converting encryption schemes, on the other hand, have important disadvantages,
including the attacks possibility if the attacker has access to the server side.
According to press releases, it is noted that Wuala uses AES-256 to encrypt metadata and
stored information. The client signs each file with a pair of user keys, in order to
identify files that were received from third parties. The signatures are created and verified
using RSA-2048, while SHA-256 hash function is used to verify the integrity.</p>
        <p>Data encryption algorithm – converged encryption scheme.</p>
        <p>Data encryption key possession – the key is stored on the client side.</p>
        <p>
          Table 1 presents what advantages and disadvantages of each studied cloud
services [
          <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
          ]. So, unlike Wuala's service, Google Drive and DropBox have two-factor
authentication, password-attack protection, password recovery mechanism and
transfer data by TLS 1.1 protocol (SCC formation protocol).
One of the major drawbacks of each service is that message authentication uses the
SHA1 algorithm, which is considered as outdated and not resistant to hacking. In
Google Drive for messages authentication along with the SHA1 algorithm uses an
algorithm RC4 that is also a disadvantage of service because it was proven that the
modern attacks on the RC4 allow to break it for a few days or even hours. Another
drawback of Google Drive is that it does not implement server-side data encryption.
Wuala uses the Diffie-Hellman protocol for key agreement, while Google Drive and
DropBox use the Diffie-Hellman protocol on elliptic curves.
        </p>
        <p>
          Table 2 shows the analysis of the basic encryption algorithms used in cloud
services. This also was given from previous review part [
          <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
          ].
Next Section of the paper consists on improvement of cryptographic security of
Google Drіve that is most effective among analyzed cloud services; it based on stream
cipher but has some vulnerability (Table 2).
        </p>
        <p>
          This is very important issue because possible types of security challenges for cloud
computing services include compromises to the confidentiality and integrity of data in
transit to and from a cloud provider and at rest [
          <xref ref-type="bibr" rid="ref1 ref8">1,8</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Improving Stream Cipher for Cloud Services</title>
      <p>3.1</p>
      <sec id="sec-3-1">
        <title>RС4 Stream Cipher Description</title>
        <p>Google Drіve is data store owned by Google Inc. that allows users to store their data
on servers in the cloud and share it with other users on the Internet.</p>
        <p>
          During the analysis of Google Drive, the principle of securing communication
channel between the client and the server was considered in Section 2. Let's take a
closer look at the RC4-128 message encryption algorithm [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. RС4 is streaming
cipher developed by Ron Rivest in 1987, when he worked for the US company RSA
Security. Has become a common algorithm used in such popular protocols as TLS (to
secure internet traffic) and WEP (for wireless network security). Among others, it
stands out for its speed and ease of software implementation, but the PC4 has flaws
that indicate its inappropriate use in the latest systems. RС4-128 uses a sequence of
numbers from 0 to 127 in the array S, which changes when algorithm works (Fig. 2).
RС4-128 consists of following processes: Key Scheduling Algorithm (KSA),
Pseudorandom Number Generation (PRNG) and Data Encryption. These processes are
described by Pseudo-code 1. Besides that, RC4 is value part of security system in
BitTorrent, Skype, Opera, Kerberos, PDF etc.
        </p>
        <p>Pseudo-code 1:
1. .KSA to set the initial value of the array S:
1.1.
1.2.
1.3.</p>
        <p>KSA stars work with S initialization such as S[і]=і, for і .</p>
        <p>The secret key is given by a set of numbers, which are placed in a key array
K, that also contains128 elements. Usually, a short sequence of numbers is
selected, which is then repeated until K is filled.</p>
        <p>The key array is used to convert S by the following scheme:
1.3.1. j=0;
1.3.2. For і the following steps are performed:
1.3.2.1. j=(j+ S[і] + K[і])mod128;
1.3.2.2. buf=S[і]; S[і]=S[j]; S[j]= buf.
2. PRNG algorithm for encryption:
2.1. A byte array k of PRN is generated, selecting random elements of the S array
for the next sample:
2.1.1. і = 0; j = 0;
2.1.2. The following algorithm is used to generate each byte of a random
stream:
2.1.2.1. і = (і+1)mod128;
2.1.2.2. j = (j+S[і])mod128;
2.1.2.3. buf=S[і]; S[і]=S[j]; S[j]= buf.
2.1.2.4. t = (S[і] + S[j])mod128;
2.1.2.5. k = S[t]
3. Data Encryption:
3.1. X-plain text; Y-ciphertext;
.</p>
        <p>
          The Fast Software Encryption Cryptographic Conference took place in Singapore
in 2013, the main event being the speech of American Professor Dan Bernstein, who
introduced the method of bypassing TLS (Transport Layer Security) and SSL (Secure
Sockets Layer) protocols if they use RC4 encryption algorithm [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>
          Successful attack on the cipher can be carried out due to insufficient randomness of
the bit stream to which the message is transmitted. If chase a large number of network
packets through this stream, it can be detected enough repetitive patterns to get the
original content of the message. Successful attacks require the capture of large
amounts of encrypted traffic. The researcher reported that he managed to bypass TLS
protection in 32 hours, but hackers can apply various techniques to optimize and
accelerate the RC4 hacking process. Apparently, this encryption algorithm is not crypto
resistant (secure) and requires improvement [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Proposed Improving of RC4 Stream Cipher</title>
        <p>
          Therefore, improved stream cipher called ISC2k19 was developed, which eliminates
the disadvantages of RC4 by changing the PRNG algorithm to substitution table
implementation (S-box) and the use of constants, generation of additional PRNG flow
and data encryption algorithm changing, which allows to increase the cryptographic
security [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] of the algorithm.
        </p>
        <p>ISC2k19 uses a sequence of numbers from 0 to 255 in the array S, which changes
during algorithm works. ISC2k19 consists of four following processes (described by
Pseudo-code 2):
Pseudo-code 2:
1. KSA to set the initial value of the array S:
1.1. KSA stars work with S initialization such as S[і]=і, for і .
1.2. The secret key is given by a set of numbers that are placed in the key array K,
which also contains 128 elements. Usually, a short sequence of numbers is selected,
which is then repeated until K is filled.</p>
        <p>1.3. The key array is used to convert S by the following scheme:
1.3.1. j=0;
1.3.2. For і the following steps are performed:
1.3.2.1. j=(j+ S[і] + K[і])mod128;
1.3.2.2. Then S[і] and S[j] are modified using a tables of substitutions (S-box,
Table 3) and constants (Const, Table 4);
1.3.2.3. S[j]= Sbox (S[j]+Const[i]) ; S[i]= Sbox(S[i]).</p>
        <p>1.3.2.4. buf=S[і]; S[і]= S[j]; S[j]= buf.
2. PRNG algorithm for randomly selecting array elements and changing array S, for
S[і], where і .
2.1. A byte array of PRN is generated by selecting random elements of array S for
the next sample:
2.1.1. і = 0; j = 0;
2.1.2. The following algorithm is used to generate each byte of a random
stream:
2.1.2.1. і = (і+1)mod128;
2.1.2.2. j = (j+S[і])mod128;
2.1.2.3. Then S[і] and S[j] are modified using a tables of substitutions
(S-box, Table 3) and constants (Const, Table 4);
2.1.2.4. S[j]= Sbox (S[j]+Const[i]) ; S[i]= Sbox(S[i])
2.1.2.5. buf=S[і]; S[і]=S[j]; S[j]= buf.
2.1.2.6. t = (S[і] + S[j])mod128;
2.1.2.7. k = S[t].
3. The algorithm for generating an additional stream of PRN for randomly selecting
array elements and changing array S, S[і], where і .
3.1.Bytes r of PRN of key are generated by selecting random array S elements.
3.1.1. і= 128, j=0.
3.1.2. j=(j+1)mod128.
3.1.3. S[m] = S[і-1] (S[і-1] &lt;&lt;&lt; j).</p>
        <p>3.1.4. r = S[m].
4. Data encryption:
4.1. X- plain text; Y-ciphertext; Y і</p>
        <p>Both Table 3 and Table 4 are used in PRNG algorithm forming process of ISC2k19
stream cipher for security improving.
Constant 51
Index</p>
        <p>96
Constant 53
Constant 04
4f
66
2c
82
40
98
00
23
1a
83
8f
ed
c3
46
72
52
88
bc
6a
07
3b
89
b6
cb
4a
eb
5e
77
e3
93
ff
4c
27
0b
78
2f
94
f3
58
b2
db
79
84
95
d2
cf
75
1b
84
92
20
2a
69
6e
85
9d
fc
5a
86
38
b1
05
Index
112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127
18
96
12
80
Next Section of this work contains experimental technique as well as study of RC4
and improved stream cipher (ISC2k19).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Experimental Study of Stream Ciphers</title>
      <p>4.1</p>
      <sec id="sec-4-1">
        <title>Experimental Research Technique</title>
        <p>
          An experimental study conducted to confirm or refute the hypothesis. To obtain the
maximum result, it is necessary to clearly describe the study methodology. The
conclusions of the theory, that would be experimentally studied should include only
observable quantities. If it is difficult to predict the result theoretically, it is advisable to
use statistical results. These experiments are based on traditional standards of research
study in cryptography [
          <xref ref-type="bibr" rid="ref13 ref14 ref15">13-15</xref>
          ] and particularly in stream cipher security analysis
[1618]. To perform each experiment study, it is necessary:
1. Determine the experimental purpose;
2. Set a target task;
3. Select the research object;
4. Identify input and output data;
5. Create a program of experimental work;
6. Determine the methods and techniques of intervention in the research object;
7. Develop techniques for recording the progress and results of the experiment;
8. Prepare instruments, devices, applications, etc.
        </p>
        <p>According to the hypothesis, the qualitative nature of the expected results is
predetermined: this will ensure a quick and correct evaluation of them, instantly alert
with unexpected results, and help to avoid false conclusions.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Experimental Study of Ciphers Speed (Experiment №1)</title>
        <p>The purpose of this experiment is study the speed characteristics of RC4 and
improved stream cipher ISC2k19. To achieve mentioned purpose the following tasks
should be performed:
1. Estimation the speed of 100KB data cryptographic transformation by software
application based on both stream ciphers;
2. Estimation the speed of 1MB data cryptographic transformation by software
application based on both stream ciphers;
3. Estimation the speed of 10 MB data cryptographic transformation by software
application based on both stream ciphers;
4. Estimation the speed of 100 MB data cryptographic transformation by software
application based on both stream ciphers.</p>
        <p>Research object: the process of data cryptographic transformation.</p>
        <p>Input data: encryption file, key stream.</p>
        <p>Output data: encryption/decryption speed.</p>
        <p>The experiment is performed manually with the help of the developed software
application; the results are recorded in the Table 6. To confirm the achievement of this
purpose, a comparative speed test of the encryption and decryption was carried out
(between software-implemented cipher RC4-128 and developed ISC2K19 cipher).
Testing was performed on four different computers; the characteristics of their
hardware are given in Table 5.
Testing was carried out for four selected files of different sizes (Table 6).
The speed of ISC2K19 algorithm averaged was 20,2 MB/s, while the RC4-128 speed
is 24,05 MB/s. Therefore, the improved stream cipher ISC2K19 showed worse results
than RC4-128 during speed tests by 14.8%. But since the difference in time between
RC4-128 and ISC2K19 data encryption is negligible, the speed of ISC2K19 is not a
major disadvantage (security is priority parameter).</p>
      </sec>
      <sec id="sec-4-3">
        <title>Experimental Study of Ciphers Statistical Security (Experiment №2)</title>
        <p>The purpose of this experiment is study the statistical characteristics of cryptographic
security of RC4 and improved stream cipher ISC2k19. To achieve mentioned purpose
the evaluation the statistical characteristics of both stream ciphers using the NIST
STS technique.</p>
        <p>Research object: data encryption process.</p>
        <p>Input data: encrypted files by size 100 КB, 1МB, 10МB, 100МB.</p>
        <p>Output data: test coefficients.</p>
        <p>
          The experiment is performed by a console version of the NIST STS [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. In
accordance to [
          <xref ref-type="bibr" rid="ref20 ref21">20-21</xref>
          ] the most modern analytical attacks are statistical; during
cryptanalysis, a large number of encryptions are performed to obtain a key, and round key
variants are formed based on ciphertexts. When processing a sufficiently large sample
of ciphertexts formed on a single key, the correct value of key bits is more common
that the other variants. Obviously, the probability of finding the right pair, which
gives a specific value of the key, depends on the statistical properties of the cipher. To
increase the complexity of cryptanalysis, the properties of cryptograms must be close
to random sequences. Therefore, a necessary (but not sufficient) condition for cipher
security to analytic attacks is to provide good statistical properties of the output
sequence (ciphertexts).
        </p>
        <p>
          To test the statistical characteristics of the developed cryptoalgorithm it was tested
in accordance with the NIST STS technique [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Software implementation of the
algorithm is subjected to statistical testing using the NIST STS. The following
parameters were selected for testing:
1. The length of the tested sequence n=106 bit;
2. The number of tested sequences m=100;
3. Significance level α=0,01.
        </p>
        <p>Thus, the sample size under test was N = 100 × 106 bit; number of tests q for
different lengths q = 188. Thus, the statistical portrait of the generator contains 18800
values of P probability.</p>
        <p>In the ideal case, with specified parameters, only one sequence of one hundred can
be discarded during testing, so the pass speed of each test should be 99%. But this
restriction is too strict, so a rule based on the rj confidence interval applies. The lower
bound in this case is the value Pmіn = 0,96015. From this viewpoint, the results of
testing cryptographic algorithm and the key extension algorithm were analyzed.
Analyzing the results, it can be conclude that the software implementation of the
improved stream cipher passed complex control according to the NIST STS technique
and showed better results than RC4-128 on 4.7%.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>In the paper up-to-date cloud services Wuala, DropBox and Google Drive was
analyzed, this made it possible to understand the schemes of their work, to determine
what security methods and algorithms are used for data transmission as well as the
main advantages and disadvantages of cloud services were emphases. Besides, the
analysis of cryptographic methods and systems used in cloud services were carried
out. This made it possible to understand what are the disadvantages of encryption
algorithms and how to get rid of them.</p>
      <p>An improved stream cipher ISC2k19 based on RC4-128 (used in TLS, SSL, SSH,
WEP, BitTorrent, Skype, Opera, Kerberos, PDF) was developed to provide
cryptographic security in cloud services without reducing performance (this improvement is
directed on the most effective cloud service Google Drіve). This cipher contains
additional byte transformations in the algorithm of PRN formation. An additional PRN is
also generated.</p>
      <p>Experimentally the speed of ISC2k19 realization was compared with RC4-128 and
the speed of ISC2K19 showed worse results than RC4-128 during speed tests by
14.8%. But since the difference in time between RC4-128 and ISC2K19 data
encryption is negligible, the speed of ISC2K19 is not a major disadvantage. Also was
performed an experimental study of security using the NIST STS: ISC2K19 passed
complex control by NIST STS and showed better results than RC4-128 on 4.7%.</p>
      <p>
        The future research study can be related with ISC2K19 security analysis and
quantitative assessment of its security against various cryptanalytic attacks [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>NIST</given-names>
            <surname>Cloud Computing Standards Roadmap</surname>
          </string-name>
          ,
          <source>National Institute of Standards and Technology Special Publication 500-291 V2</source>
          , 108 p.,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>H.</given-names>
            <surname>Susanto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.N.</given-names>
            <surname>Almunawar</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.C.</given-names>
            <surname>Kang</surname>
          </string-name>
          , “
          <article-title>Toward Cloud Computing Evolution: Efficiency vs Trendy vs Security”</article-title>
          ,
          <source>Computer Science Journal &amp; Social Science Research Network</source>
          ,
          <year>September 2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>ST</given-names>
            <surname>Louis Cloud Computing - Cloud Hosting - Virtual Servers</surname>
          </string-name>
          , Available online, URL: http://www.accessus.net/business-services/cloud-computing/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Koval</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , S. Bondarovets, “
          <article-title>Anomaly Detection System in Secure Cloud Computing Environment”</article-title>
          ,
          <source>International Journal of Computer Network and Information Security (IJCNIS)</source>
          , vol.
          <volume>9</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>C.</given-names>
            <surname>Chu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhu</surname>
          </string-name>
          , J. Han,
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Xu</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , “Security Concerns in Popular Cloud Storage Services”,
          <source>in IEEE Pervasive Computing</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>50</fpage>
          -
          <lpage>57</lpage>
          , Oct.-
          <source>Dec</source>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>V.J.</given-names>
            <surname>Raymond</surname>
          </string-name>
          and E. Sushmitha, “
          <article-title>Google drive based secured anti-theft android application</article-title>
          ”,
          <source>2017 International Conference on IoT and Application (ICIOT)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Information</given-names>
            <surname>Security</surname>
          </string-name>
          .
          <article-title>How does Wuala store symmetric key? Available online</article-title>
          , URL: https://security.stackexchange.com/questions/37247/how-does
          <article-title>-wuala-store-symmetric-key</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xiao</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiao</surname>
          </string-name>
          , “
          <article-title>Security and privacy in cloud computing”</article-title>
          ,
          <source>IEEE Commun. Surveys Tuts.</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>843</fpage>
          -
          <lpage>859</lpage>
          , 2nd Quart.,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>G.</given-names>
            <surname>Paul</surname>
          </string-name>
          and S. Maitra, “
          <article-title>RC4 Stream Cipher and its Variants”</article-title>
          ,
          <string-name>
            <surname>Boca</surname>
            <given-names>Raton</given-names>
          </string-name>
          , FL, USA: CRC Press,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>D.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          ,
          <article-title>Failures of secret-key cryptography, Available online</article-title>
          , URL: https://www.iacr.org/workshops/fse2013/slides/Slides07.pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>B. Subhadeep; I. Takanori</surname>
          </string-name>
          ,
          <source>Cryptanalysis of the Full Spritz Stream Cipher. Lecture Notes in Computer Science</source>
          , Springer Berlin Heidelberg. pp.
          <fpage>63</fpage>
          -
          <lpage>77</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kovtun</surname>
          </string-name>
          , N. Seilova, “
          <article-title>Method of searching birationally equivalent Edwards curves over binary fields</article-title>
          ,
          <source>” Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>754</volume>
          , pp.
          <fpage>309</fpage>
          -
          <lpage>319</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kinzeryavyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          et al, “
          <article-title>High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks,”</article-title>
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2104</volume>
          , pp.
          <fpage>657</fpage>
          -
          <lpage>668</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>S. Das</surname>
            ,
            <given-names>J. U.</given-names>
          </string-name>
          <string-name>
            <surname>Zaman</surname>
          </string-name>
          , R. Ghosh, “
          <article-title>Generation of AES S-boxes with various modulus and additive constant polynomials and testing their randomization”</article-title>
          ,
          <source>Proc. Technol</source>
          ., vol.
          <volume>10</volume>
          , pp.
          <fpage>957</fpage>
          -
          <lpage>962</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akhmetov</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlovskyi</surname>
            <given-names>V.</given-names>
          </string-name>
          et al, “
          <article-title>New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis”</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>1126</volume>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>104</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lutsenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Ivanenko</surname>
          </string-name>
          , “
          <article-title>Strumok stream cipher: Specification and</article-title>
          basic properties”,
          <year>2016</year>
          3rd
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical Conference</surname>
          </string-name>
          Problems of Infocommunications Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, pp.
          <fpage>59</fpage>
          -
          <lpage>62</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. I.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lutsenko</surname>
            and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ivanenko</surname>
          </string-name>
          , “
          <source>The research of modern stream ciphers”</source>
          ,
          <year>2017</year>
          4th
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical Conference</surname>
          </string-name>
          Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, pp.
          <fpage>207</fpage>
          -
          <lpage>210</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Frolenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Eremin</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Zavgorodnia</surname>
          </string-name>
          , “
          <article-title>Research of cross-platform stream symmetric ciphers implementation</article-title>
          ”,
          <source>2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine, pp.
          <fpage>300</fpage>
          -
          <lpage>305</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>A</given-names>
            <surname>Statistical Test</surname>
          </string-name>
          <article-title>Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications</article-title>
          . NIST Special Publication 800-22, May 15,
          <year>2001</year>
          ,
          <volume>164</volume>
          р.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. I.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Alekseychuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Tymchenko</surname>
          </string-name>
          , “Strumok keystream generator”,
          <source>2018 IEEE 9th International Conference on Dependable Systems Services and Technologies (DESSERT)</source>
          ,
          <source>Kyiv Ukraine</source>
          , pp.
          <fpage>294</fpage>
          -
          <lpage>299</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>O.</given-names>
            <surname>Nariezhnii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Eremin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Frolenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chernov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kuznetsova</surname>
          </string-name>
          and
          <string-name>
            <given-names>I. Chepurko</given-names>
            , “Research of Statistical Properties of Stream Symmetric Ciphers”, 2018 International ScientificPractical Conference Problems of Infocommunications. Science and
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine, pp.
          <fpage>696</fpage>
          -
          <lpage>700</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>B.</given-names>
            <surname>Akhmetov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kinzeryavyy</surname>
          </string-name>
          , Kh.Yubuzova,
          <article-title>Studies on practical cryptographic security analysis for block ciphers with random substitutions</article-title>
          ,
          <source>International Journal of Computing</source>
          , vol.
          <volume>19</volume>
          , issue 2, pp.
          <fpage>298</fpage>
          -
          <lpage>308</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>