<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The practice of block symmetric encryption for a secure Internet connection⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tetiana Korobeinikova</string-name>
          <email>tetiana.i.korobeinikova@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ihor Zhuravel</string-name>
          <email>ihor.m.zhuravel@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lesya Mychuda</string-name>
          <email>lesia.z.mychuda@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Axel Sikora</string-name>
          <email>axel.sikora@hs-offenburg.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CSDP-2024: Cyber Security and Data Protection</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepana Bandery str., 79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Applied Sciences Offenburg</institution>
          ,
          <addr-line>24 Badstrasse, 77652 Offenburg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>114</fpage>
      <lpage>122</lpage>
      <abstract>
        <p>The paper discusses the process of block parallelization in the Advanced Encryption Standard (AES) cipher, focusing on the Counter (CTR) mode. It details the benefits of this process, including increased data processing performance and effective resource utilization; emphasizes the independent encryption of each data block in CTR mode, which allows for effective parallelization, especially when handling large data volumes. This work outlines the steps involved in the AES operation scheme in CTR mode, from splitting data into blocks to generating the final ciphertext. It further explains the concept of a unique “counter” or “initialization vector” for each block, which, combined with the key, generates a unique encryption key, enabling parallel processing. The idea implementation delves into the programming of the block parallelization algorithm using services on the Java Spring Boot platform. It describes the roles of the purposed Client Service and Server Service in encrypting and transmitting messages and files and decrypting received messages. This work presents an experiment that tests the hypothesis that blocks parallelization in AES cipher using CTR mode increases performance during the processing of large data volumes. The experiment involves different data volumes and compares the processing speeds of the AES algorithm with and without parallelization. The results confirm the hypothesis, showing that block parallelization in AES for large data volumes can double the data processing speed compared to the nonparallel approach. The paper concludes that block parallelization might be effective not only for the AES algorithm but also for any block symmetric algorithm. It also suggests that parallelization allows for more efficient use of multi-core systems and reduces the execution time to complete the encryption operation.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;block parallelization</kwd>
        <kwd>AES cipher</kwd>
        <kwd>CTR mode</kwd>
        <kwd>data processing performance</kwd>
        <kwd>encryption optimization1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In a world of increasing digital connectivity and Internet
interaction, the issue of connection security is becoming one
of the most crucial problems [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1–9</xref>
        ]. Ensuring the
confidentiality, integrity, and availability of information is
becoming a priority [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9–11</xref>
        ]. This work is focused on
reviewing and improving block symmetric encryption
methods aimed at solving the problems of connection
security on the Internet. New technologies and encryption
algorithms are important tools for maintaining data
confidentiality and ensuring resilience to modern cyber
threats [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16 ref17">12–17</xref>
        ].
      </p>
      <p>Thus, there is a need to analyze, improve, and expand the
methodological base of methods and tools that use block
symmetric ciphers.</p>
      <p>The goal is to improve the methods of block symmetric
encryption through the process of block parallelization to
solve the problem of secure connections on the Internet.</p>
      <p>The object is the processes associated with the use of
block encryption algorithms, in the context of their
application on the Internet and the HTTPS protocol.
The subject is methods and means of protecting connections
on the Internet, including the analysis of encryption
efficiency.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        It is known that the increasing number of digital connections
during Internet interaction becomes the issue of connection
security. Cristina Del-Real et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] say that the design of
software systems plays a crucial role in mitigating
cybersecurity incidents; Sood et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and Jang et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] are
paying attention to DoS attacks through HTTP and IP.
      </p>
      <p>
        Gentile et al. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] showed the algorithms to ensure
suitable data transmission and encryption ratios and used
Transport Layer Security (TLS) tunnels for local sensor data
and secure socket layer tunnels to transmit TLS-encrypted
data to a cloud-based central broker. Also, Kampourakis et
al. in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] o er a framework that can accurately detect all
anomalous enterprise network activities.
      </p>
      <p>
        Nowadays connections to the Internet are connections
to the Cloud. Cloud storage is popular among syudy and
businesses because of cost reduction, performance
0000-0003-2487-8742 (T. Korobeinikova); 0000-0003-1114-0124
(I. Zhuravel); 0000-0001-8266-1782 (L. Mychuda); 0000-0003-0878-2919
(A. Sikora)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
improvement, productivity enhancement, and security.
However, Alqahtani et al. in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] are focused on security
risks since data is stored with third-party providers, and
internet access can limit visibility and control. Compared to
traditional on-premise computing, data security and
protection are critical concerns in cloud computing.
Ensuring data security in the cloud involves various
methods, with cryptography being the most crucial
(Sasikumar and Nagarajan in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]).
      </p>
      <p>So, cryptography provides several security features,
including authentication, con dentiality, integrity, and
availability.</p>
      <p>Today, it is important to analyze, improve, and expand
the methodological base of methods and tools that use block
symmetric ciphers.</p>
      <p>
        Boura et al. in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] offer tools and algorithms to search
for related-key distinguishers and attacks of a differential
nature against the AES. Yevseiev et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] offer the
Niederreiter-modified crypto-code structure with additional
initialization vectors that require an increase in the speed of
cryptographic transformation of the system as a whole.
While Opirskyy et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] are working on standardizing
post-quantum cryptography.
      </p>
      <p>So, there is a critical need to work on improving the
methods of block symmetric encryption through the process
of block parallelization to solve the problem of secure
connections on the Internet.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Initial information that establishes research</title>
      <p>
        Stream encryption algorithms. A stream cipher is a type
of symmetric encryption that encrypts each digit of the
plaintext separately using a key stream. Stream ciphers are
faster than block ciphers and require less hardware but can
be vulnerable to attacks [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17–19</xref>
        ].
      </p>
      <p>
        There are two types of stream ciphers: synchronous and
self-synchronizing. Synchronous stream ciphers generate a
sequence of pseudorandom digits independently of the
plaintext and ciphertext messages. Self-synchronizing stream
ciphers use the last N digits of the ciphertext to generate a key
stream [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        Block encryption algorithms. A block cipher is an
algorithm that encrypts fixed-length data blocks to protect
information. Electronic Code Book mode encrypts blocks
independently, but patterns can be detected. To increase
security, modes that introduce randomization through an
Initialization Vector (IV) are used. Various modes of block
cipher operation have been developed and defined in national
and international standards [
        <xref ref-type="bibr" rid="ref21 ref22">21–22</xref>
        ]. The basic idea is to
introduce randomization of the plaintext data using an IV to
achieve probabilistic encryption.
      </p>
      <p>
        The rationale for using block symmetric encryption
for secure Internet connections. Encryption algorithms
are known for their high computational requirements,
especially for wireless devices with limited resources [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>Encryption guarantees data confidentiality and
protection against interception and plays an important role in
authentication, data integrity, and access control.</p>
      <p>Encrypting even a small amount of data, such as 13.6
kilobytes, using a 32-bit Blowfish key can consume about 75%
of resources. Modern security standards recommend using
keys of at least 80 bits.</p>
      <p>Encryption and data transmission are important in
wireless networks. There is potential for encrypting test
packets with lightweight encryption algorithms if the
security of the device is not compromised. There are
numerous encryption algorithms for wired networks, divided
into two categories: symmetric key encryption and
asymmetric key encryption. Symmetric key encryption
requires the distribution of a key between the parties before
data is transmitted.</p>
      <p>Asymmetric key encryption solves the problem of key
distribution but is computationally intensive. In wireless
devices, symmetric key encryption, such as RC4, is
predominant, as it is fast and efficient. However, the
discovered vulnerabilities in RC4 led to the introduction of a
new security standard for WLANs—IEEE 802.11i, based on
AES. AES is known for its speed, flexibility, and robust
security features.</p>
      <p>Block ciphers, such as AES, are used in WLANs to encrypt
data, ensuring its confidentiality. Security protocols such as
WPA2 and WPA3 use AES-CCMP to ensure data integrity.
Block ciphers are also used to authenticate devices and users,
and to manage encryption keys. They are the core
components of WLAN security.</p>
      <p>Block ciphers are used in WLANs to ensure data
confidentiality and integrity, as well as device and user
authentication. They are standardized, efficient, and scalable,
making them a reliable choice for securing wireless
communications. Overall, they enhance WLAN security by
meeting security standards and requirements.</p>
      <p>Rationale for choosing the AES to solve the problem
of secure Internet connection. DES, while a popular
encryption standard in the past, has fallen out of favor due to
its limited key length and vulnerability to modern attacks.
AES is known for its high security, efficiency, and wide
support, making it the best choice for secure Internet
connections. The Twofish algorithm, although it has its
advantages, is not as widespread as AES and is not a standard
for general use.</p>
      <p>The rationale for choosing AES is based on its
standardization, wide support, high level of security, and
efficiency. Its status as a global standard recommended by key
security institutions such as NIST emphasizes its reliability.
Its ability to work efficiently in real time makes it an ideal
choice for secure Internet connection tasks where speed and
security of data transmission are important.</p>
      <p>This choice provides strong encryption, meets modern
requirements, and helps to create secure connections in a
virtual environment.</p>
      <p>AES can be slow when processing large amounts of data
for several reasons. First, the AES block size is fixed (typically
128 bits), and a large amount of data requires many blocks,
which can affect the overall speed. In addition, some AES
modes of operation may include padding operations and
other additional operations that can also increase the time
consumption.</p>
      <p>A large amount of data can lead to additional
computational costs and increased execution time, in cases
where enhanced security or authentication modes are used.
To improve the algorithm, a block parallelization mechanism
was chosen.</p>
      <p>The decision to optimize the AES algorithm using block
parallelization for secure Internet connections can be
justified:

</p>
      <p>Large volumes of data: large amounts of data are
commonly processed on the Internet, especially
when transferring files or in other data-intensive
scenarios. Block parallelization allows the
efficient distribution of encryption tasks among
different computing resources, ensuring fast
processing.</p>
      <p>Increased performance: performance is a key
factor in determining the quality of an Internet
connection. Parallelization allows you to use
parallel resources to simultaneously process
multiple blocks of data, increasing the speed of
encryption and decryption operations.</p>
      <p>Data security: AES is a secure algorithm, but
improving performance should not compromise security.
Block parallelization allows for optimal performance
without compromising encryption security.</p>
    </sec>
    <sec id="sec-4">
      <title>4. The block parallelization process</title>
      <p>Parallelization is a key strategy for encryption optimization
aimed at increasing data processing performance in this
work. It will show the main aspects of the block
parallelization process, its benefits, and possible challenges,
and consider how the implementation of block
parallelization helps to optimize the AES cipher for
highperformance information processing tasks.</p>
      <sec id="sec-4-1">
        <title>4.1. Detailed description of the process</title>
        <p>
          When parallelizing blocks and using AES encryption, CTR
(Counter) [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] mode is the most effective strategy, especially
in situations where parallel processing and high performance
are important.
        </p>
        <p>
          Optimized parallelization allows to maintenance of high
performance in real-time processing areas where
responsiveness to data is key. At the same time, efficient
resource utilization and security ensure that large amounts of
information are effectively handled, providing an optimal
combination of performance and data privacy [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>The choice of AES ciphers in CTR mode for block
parallelization is based on their combination of security,
efficiency, and standardization, namely, keys of different
lengths (including 256 bits) and implementation speed.</p>
        <p>In CTR mode, each block of data is encrypted
independently, which allows to effectively parallelize the
encryption process. This is especially important when
processing large amounts of data, where parallel use of
resources can significantly improve performance.</p>
        <p>The combination of AES and CTR modes provides a
robust encryption mechanism that can work effectively in a
parallelized environment, ensuring a high level of security
and data processing efficiency.</p>
        <p>The main advantages of using CTR mode when
parallelizing blocks:
 Block independence (CTR mode uses encryption
with a key and unpredictable counter values for each
block. This allows each block of data to be encrypted
independently, which is ideal for parallel processing).
 Ease of implementation and computation (CTR
mode is noted for its ease of implementation and
minimized computation, as each block is encrypted
independently of the others. This makes it effective for
use in environments where computing resources are
limited).
 Parallel processing capability (since each block is
encrypted independently, CTR mode lends itself easily
to parallel computing. Different blocks can be processed
by different computing units or even on different
devices, contributing to speed and efficiency).
 Data Structure Preservation (CTR mode allows
you to preserve the structure of the original data during
encryption. Each block is replaced by an encrypted
block of the same length, which avoids data expansion
or compression during encryption).</p>
        <p>Note that while CTR mode has many advantages for
parallel processing, it is important to manage the counter and
key properly to avoid vulnerabilities. When using CTR mode,
you should avoid reusing counter values for the same key.</p>
        <p>The AES operation scheme in the CTR mode is shown in
Fig. 1.
The AES operation scheme in the CTR mode contains the
following steps:</p>
        <p>1. Splitting Data into Blocks: the input data is divided
into blocks of fixed size. Each block has a length due to the
AES block size (128 bits or 16 bytes).</p>
        <p>2. Generate Counters: a unique counter is created for
each block. It generates a unique key for each block.</p>
        <p>3. Encrypting Blocks with AES: the resulting counters
are used as input for the AES block used in the encryption
mode. The generated result is XOR'd with the corresponding
block of input data, which ensures block encryption.</p>
        <p>4. Counter increment: after the block encryption is
completed, the counter is incremented to generate a new
value for the next block.</p>
        <p>5. Repeat the Process for Each Block: All input blocks
are processed similarly, generating unique keys for each.</p>
        <p>6. Generate Ciphertext: the encrypted blocks are
combined into the final ciphertext.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Block parallelization process diagram</title>
        <p>The main idea of the AES block parallelization algorithm in
CTR mode is to create independent keys for each data block,
which allows to effectively parallelize the encryption process.
Each block is processed independently, which improves the
speed of processing large amounts of information. The AES
block parallelization scheme in CTR mode is shown in Fig. 2.
In this mode, a unique “counter” or “initialization vector” is
created for each block, which is combined with the key to
generate a unique encryption key. Thus, each block uses a
different key, and they can be processed in parallel.</p>
        <p>The AES block parallelization algorithm in CTR mode
(Fig. 3) involves partitioning into blocks, generating unique
counters for each block, encrypting each block independently
of the others, and combining the encrypted blocks to produce
the final ciphertext.</p>
        <p>
          The key stream is an important part of the encryption
process, especially when considering parallel computing to
encrypt multiple blocks of data simultaneously. The key
stream is used to create unique keys for each block of data.
This is achieved by using a counter and key values. The
counter value is determined by the stream number that points
to a specific data block. The key is formed using the result of
the Diffie-Hellman algorithm [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], which ensures the security
of key exchange.
        </p>
        <p> Parallel computation: all data blocks compute
their keys in a parallel way, which significantly speeds
up the encryption process. Each block uses its key
stream to generate a unique key. This increases the
efficiency of encryption because the blocks can be
processed simultaneously without unnecessary delays.
 Storing of encrypted blocks: when a block
completes its work, the encrypted block is saved to a
separate thread that functions as a container for
collected encrypted blocks. This encrypted block
collection stream can be used for further processing or
transmission.
 Creating of the ciphertext: whet the computation
of all blocks is complete, the encrypted blocks are
formed into ciphertext. This text can be used for storage,
transmission, or other purposes, ensuring the data
confidentiality and integrity.
 Using the Diffie-Hellman algorithm: the DH
algorithm guarantees the security of key exchange by
defining a shared secret key between the parties, which
ensures the confidentiality of information. The result of
this algorithm is used as the basis for creating unique
keys for each block of data in the stream.</p>
        <p>In general, this process ensures a high level of security
and encryption efficiency for parallel data block computation.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Programming the block parallelization algorithm</title>
      <p>This section describes the process of developing and
programming the AES block parallelization algorithm using
developed services on the Java Spring Boot platform. These
services will interact to securely exchange and process
encrypted messages and files.</p>
      <p>Client Service is responsible for messages encrypting
and messages transmitting to the server for further
processing. It uses AES and keys to encrypt messages. The
encrypted messages are sent to the server for decryption and
saving to a file.</p>
      <p>Server Service is responsible for receiving encrypted
messages and decrypting those messages. The decrypted
messages are saved to a file. Server Service is responsible for
encrypting files and sending encrypted files to the client.</p>
      <p>To implement this functionality, Java Spring Boot, a
framework for developing web applications and
microservices, is used. It ensures the configuration and
efficiency of service deployment.</p>
      <p>The proposed approach ensures a secure and efficient
mechanism for exchanging encrypted messages and files
between the client and the server.</p>
      <p>So, two services, the client and the server, interact with a
secure exchange of secret keys over an unreliable channel
using the Diffie-Hellman algorithm. The structure of the
server is shown in Fig. 4a and the structure of the client is
shown in Fig. 4b.
The Server Service diagram of classes is shown in Fig. 5. The
developed Server Service consists of such classes:
 ServerController: handles HTTP requests;
receives and transmits data between the client and other
services; initiates calls to other services for data
processing.
 AESService: implements the AES encryption and
decryption algorithm. It is used by the ServerController
to ensure the confidentiality of the exchanged data.
 DataUtils: contains general methods for data
operations.
 KeyService: handles keys (generation, storage, and
processing) necessary for data encryption and
decryption. The ServerController and other services can
interact with the KeyService to ensure the security of
the exchanged data.
 ServerService: receives and processes data from
the ServerController; uses the AESService for
encryption and decryption, DataUtils for data
processing, and KeyService for key management.
b)
The developed Client Service consists of (the diagram of
classes is shown in Fig. 6).</p>
      <p>Implementation of the proposed process of block
parallelization in the AES cipher in CTR mode based on two
developed services significantly optimizes and improves the
operation of the encryption system. The increase in
performance is the result of the efficient use of computing
resources due to the process of parallelizing the processing
of data blocks. Splitting the tasks between two services
allows better management of encryption and decryption
processes, contributing to the system's scalability needs.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <sec id="sec-6-1">
        <title>6.1. Detailed description of the process</title>
        <p>It is assumed that the implementation of block parallelization
in AES cipher using CTR mode increases performance during
processing a large volume of data. The main idea is: that
dividing into parallel blocks allows more efficient use of
resources and reduces encryption and decryption time. The
hypothesis assumes that because of parallelization
implementation: (1) processing speed increases; (2) system
scalability grows. The experiment contains a comparative
analysis of speed and productivity between systems with and
without block parallelization in the AES cipher during the
processing of a real data volume.</p>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Input data and its analysis</title>
        <p>For the implementation of an improved AES algorithm, the
text data was used. Each data block was defined by a size that
corresponds to the AES standard, 128 bits. The considered
data volume was determined by the number of blocks that
were chosen for encryption. The chosen data volume value
corresponded to specific experimental conditions to study the
efficiency of parallelization in the algorithm. Input data for
the AES algorithm with improved block parallelization came
from user input. This considered the variety of algorithm
usage scenarios and subjected it to realistic conditions.
Algorithm parameters, including block size and data volume,
were chosen based on the efficiency check of the
improvement.</p>
      </sec>
      <sec id="sec-6-3">
        <title>6.3. Working with data</title>
        <p>Different data volumes were taken and checked by the AES
algorithm without parallelization and with it to determine the
efficiency of the improvement.</p>
        <p>To start, check the connection between the two services
and generate a key for the algorithm (Fig. 7).
For the request_1 in the first test, small data volumes (less
500 blocks) and standard AES algorithm in CTR mode
without parallelization were used (Fig. 8a). The result is 3
milliseconds to encrypt the request_1. Then a request_1 is
created with the same data sets, but the algorithm with
parallelization is used. (Fig. 8b).
The parallelization does not play a significant role for small
data (it was processed in 3 milliseconds).</p>
        <p>For the request_2 in the second test, bigger data volumes
were used (10000 blocks) and the standard AES algorithm in
CTR mode without (Fig.9a) and with (Fig. 9b) parallelization
was used. The request_2 was executed in 94 milliseconds,
which is 38 milliseconds less than the previous result.
a)
Figure 10: Test 3. Requests execution result with big data volumes
b)
For the request_3 in the third test, big data volumes were
used (1000000 blocks) and the standard AES algorithm in CTR
mode without and with parallelization was used. The
request_3 was processed for 10.39 seconds (Fig.10a) and 6.05
seconds (Fig. 10b), which is twice as fast as the previous result.
b)</p>
      </sec>
      <sec id="sec-6-4">
        <title>6.4. Implementation results</title>
        <p>In this section, the results of implementing the AES block
parallelization process are shown. The data processing speeds
with (Table 1) and without (Table 2) parallelization process
are compared.</p>
      </sec>
      <sec id="sec-6-5">
        <title>6.5. Hypothesis Confirmation</title>
        <p>The hypothesis about the implementation of block
parallelization in the AES cipher in CTR mode will lead to a
significant improvement in speed and encryption efficiency
in the context of processing large volumes of data. An
experiment was conducted that involved testing two
algorithms (with and without parallelization) for operation
speed and efficiency.</p>
        <p>For this experiment, different volumes of data were
used, which could be used in the real world. The experiment
showed that the hypothesis was confirmed, so block
parallelization might be effective not only for the AES
algorithm but for any block symmetric algorithm. The
experiment showed that block parallelization in AES for big
data volumes increases data processing speed by 2 times
compared to the non-parallel approach. Parallelization
allows to use of multi-core systems more efficiently and
accelerates the block processing by 50%. Without
parallelization, each block processing is sequential and it
takes a longer execution time (10.38 seconds) with
processing over 100,000 blocks. Parallelization provides
optimal resource usage, reducing the execution time by 2
0.
0034
0.
121
10.
384
e
m
i
eagT )(s
r
e
v</p>
        <p>A
In this work, a detailed exploration of the block
parallelization process when using the Advanced
Encryption Standard (AES) cipher is presented. The focus is
on the Counter (CTR) mode, which is identified as the most
effective strategy for parallelizing blocks, particularly in
contexts where parallel processing and high performance
are crucial. The benefits of block parallelization, including
block independence, ease of implementation and
computation, parallel processing capability, and data
structure preservation are shown. It also emphasizes the
importance of proper management of the counter and key
to avoid vulnerabilities.</p>
        <p>The process of block parallelization is described in
detail, from splitting data into blocks, generating counters,
encrypting blocks with AES, incrementing the counter,
repeating the process for each block, to generating the
ciphertext. The paper highlights that each block is processed
independently, which enhances the speed of processing
large volumes of information. The development and
programming of the AES block parallelization algorithm
were performed by developing services on the Java Spring
Boot platform. These services interact to securely exchange
and process encrypted messages and files. The structure and
functions of the developed Server Service and Client Service
are explained.</p>
        <p>The paper presents an experiment that tests the
hypothesis that the implementation of block parallelization
in the AES cipher in CTR mode increases performance
during the processing of large volumes of data. The
experiment involves testing two algorithms (with and
without parallelization) for operation speed and efficiency
using different volumes of data. The results of the
experiment confirm the hypothesis. Block parallelization in
AES for big data volumes increases data processing speed
by two times compared to the non-parallel approach.
Parallelization allows for more efficient use of multi-core
systems and accelerates the block processing by 50%.
Without parallelization, each block processing is sequential
and takes a longer execution time.</p>
        <p>The work demonstrates that block parallelization is not
only effective for the AES algorithm but for any block
symmetric algorithm. It provides optimal resource usage,
reducing the execution time by two times to complete the
encryption operation compared to the regular algorithm.
This process ensures a high level of security and encryption
efficiency for parallel data block computation. The proposed
approach ensures a secure and efficient mechanism for
exchanging encrypted messages and files between the client
and the server. The increase in performance is the result of
the efficient use of computing resources due to the process
of parallelizing the processing of data blocks. Splitting the
tasks between two services allows better management of
encryption and decryption processes, contributing to the
system’s scalability needs.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gentile</surname>
          </string-name>
          , et al.,
          <article-title>A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures</article-title>
          ,
          <source>Sensors</source>
          <volume>24</volume>
          (
          <year>2024</year>
          )
          <article-title>2781</article-title>
          . doi:
          <volume>10</volume>
          .3390/s24092781.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Baee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Simpson</surname>
          </string-name>
          , W. Armstrong,
          <article-title>Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata</article-title>
          ,
          <source>in IEEE Open Journal of the Computer Society</source>
          <volume>5</volume>
          (
          <year>2024</year>
          )
          <fpage>156</fpage>
          -
          <lpage>169</lpage>
          . doi:
          <volume>10</volume>
          .1109/OJCS.
          <year>2024</year>
          .
          <volume>3386715</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kampourakis</surname>
          </string-name>
          , G. Makrakis,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Kolias, From Seekand-Destroy to Split-and-</article-title>
          <string-name>
            <surname>Destroy</surname>
          </string-name>
          :
          <article-title>Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks</article-title>
          ,
          <source>Future Internet</source>
          <volume>16</volume>
          (
          <year>2024</year>
          )
          <article-title>137</article-title>
          . doi:
          <volume>10</volume>
          .3390/fi16040137.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Del-Real</surname>
          </string-name>
          , E. De Busser,
          <string-name>
            <surname>B. van den Berg</surname>
          </string-name>
          ,
          <article-title>Shielding Software Systems: A Comparison of Security by Design and Privacy by Design Based on a Systematic Literature Review</article-title>
          ,
          <source>Computer Law &amp; Security Review</source>
          <volume>52</volume>
          (
          <year>2024</year>
          )
          <article-title>105933</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.clsr.
          <year>2023</year>
          .
          <volume>105933</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sood</surname>
          </string-name>
          , N. Hubballi,
          <article-title>SlowTrack: Detecting Slow Rate Denial of Service Attacks Against HTTP with Behavioral Parameters</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Supercomput</surname>
          </string-name>
          .
          <volume>80</volume>
          (
          <year>2024</year>
          )
          <fpage>1788</fpage>
          -
          <lpage>1817</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11227-023-05453-3.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O.</given-names>
            <surname>Harasymchuk</surname>
          </string-name>
          et al.,
          <source>Generator of Pseudorandom Bit Sequence with Increased Cryptographic Security, Metallurgical and Mining Industry: Sci. Tech. J</source>
          .
          <volume>6</volume>
          (
          <issue>5</issue>
          ) (
          <year>2014</year>
          )
          <fpage>24</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Yudin</surname>
          </string-name>
          , et al.,
          <article-title>Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information (</article-title>
          <year>2019</year>
          ) 2019
          <source>IEEE International Conference on Advanced Trends in Information Theory, ATIT 2019 - Proceedings</source>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Maksymovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shabatura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Harasymchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Karpinski</surname>
          </string-name>
          , et al.,
          <article-title>Development of Additive Fibonacci Generators with Improved Characteristics for Cybersecurity Needs</article-title>
          . Appl. Sci. (Basel)
          <year>2022</year>
          ,
          <volume>12</volume>
          , 1519, doi:10.3390/app12031519.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning</article-title>
          ,
          <source>in IEEE Access</source>
          <volume>12</volume>
          (
          <year>2024</year>
          )
          <fpage>52480</fpage>
          -
          <lpage>52495</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .
          <volume>3387016</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Alqahtani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Almutairi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Sheldon</surname>
          </string-name>
          , Cloud Security Using
          <string-name>
            <surname>Fine-Grained Efficient Information Flow Tracking</surname>
          </string-name>
          ,
          <source>Future Internet</source>
          <volume>16</volume>
          (
          <year>2024</year>
          )
          <article-title>110</article-title>
          . doi:
          <volume>10</volume>
          .3390/fi16040110.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sasikumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nagarajan</surname>
          </string-name>
          ,
          <article-title>Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing</article-title>
          ,
          <source>in IEEE Access</source>
          <volume>12</volume>
          (
          <year>2024</year>
          )
          <fpage>52325</fpage>
          -
          <lpage>52351</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.20
          <volume>24</volume>
          .3385449.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>T.</given-names>
            <surname>Luong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Cuong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Vo</surname>
          </string-name>
          ,
          <article-title>AES Security Improvement by Utilizing New Key-Dependent XOR Tables</article-title>
          ,
          <source>in IEEE Access</source>
          <volume>12</volume>
          (
          <year>2024</year>
          )
          <fpage>53158</fpage>
          -
          <lpage>53177</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .
          <volume>3387268</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Rakhimberdiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bozorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Berdimurodov</surname>
          </string-name>
          ,
          <article-title>Round Key Generation Algorithm Used in Symmetric Block Encryption Algorithms to Ensure the Security of Economic Systems</article-title>
          ,
          <source>7th International Conference on Future Networks and Distributed Systems (ICFNDS '23)</source>
          (
          <year>2024</year>
          )
          <fpage>548</fpage>
          -
          <lpage>554</lpage>
          . doi:
          <volume>10</volume>
          .1145/3644713.3644794.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Boura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Derbez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Funk</surname>
          </string-name>
          ,
          <article-title>Related-Key Differential Analysis of the AES</article-title>
          ,
          <source>IACR Transactions on Symmetric Cryptology</source>
          <year>2023</year>
          (
          <article-title>4) (</article-title>
          <year>2023</year>
          )
          <fpage>215</fpage>
          -
          <lpage>243</lpage>
          . doi:
          <volume>10</volume>
          .46586/tosc.v2023.
          <year>i4</year>
          .
          <fpage>215</fpage>
          -
          <lpage>243</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          , et al.,
          <source>Development of Niederreiter Hybrid Crypto-code Structure on Flawed Codes</source>
          ,
          <string-name>
            <given-names>EasternEuropean J.</given-names>
            <surname>Enterp</surname>
          </string-name>
          . Technol.
          <volume>1</volume>
          (
          <issue>9</issue>
          (
          <issue>97</issue>
          ) (
          <year>2019</year>
          )
          <fpage>27</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .
          <volume>156620</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Horpenyuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Opirskyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Vorobets</surname>
          </string-name>
          ,
          <article-title>Analysis of Problems and Prospects of Implementation of PostQuantum Cryptographic Algorithms</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          , vol.
          <volume>3504</volume>
          (
          <year>2023</year>
          )
          <fpage>39</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Luzhetsky</surname>
          </string-name>
          , et al.,
          <source>Adaptive Compression Methods of Data Based on Fibonacci Linear Forms, Proc. SPIE 10445</source>
          , Photonics Applications in Astronomy, Communications, Industry, and
          <source>High Energy Physics Experiments</source>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1117/12.2280944.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>F.-H.</given-names>
            <surname>Hsiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-W.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <article-title>Integrating RC6 Stream Cipher to a Chaotic Synchronization System</article-title>
          ,
          <source>in IEEE Access</source>
          <volume>12</volume>
          (
          <year>2024</year>
          )
          <fpage>26308</fpage>
          -
          <lpage>26323</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .
          <volume>3364702</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>N.</given-names>
            <surname>Zidarič</surname>
          </string-name>
          , et al.,
          <source>The Welch-gong Stream CipherEvolutionary Path</source>
          , Cryptogr. Commun.
          <volume>16</volume>
          (
          <year>2024</year>
          )
          <fpage>129</fpage>
          -
          <lpage>165</lpage>
          . doi:
          <volume>10</volume>
          .1007/s12095-023-00656-0.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>He</surname>
          </string-name>
          , et al.,
          <article-title>Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things, IEEE Access 8 (</article-title>
          <year>2020</year>
          )
          <fpage>20920</fpage>
          -
          <lpage>20930</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>2967</volume>
          070.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kara</surname>
          </string-name>
          ,
          <source>Lower Data Attacks on Advanced Encryption Standard, Turkish J. Electrical Eng. Comput. Sci</source>
          .
          <volume>32</volume>
          (
          <issue>2</issue>
          (
          <issue>8</issue>
          )) (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .55730/
          <fpage>1300</fpage>
          -
          <lpage>0632</lpage>
          .
          <fpage>4072</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>J.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <source>Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology, J. Global Inf. Manag</source>
          .
          <volume>30</volume>
          (
          <issue>11</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .4018/JGIM.315014.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sahun</surname>
          </string-name>
          , et al.,
          <article-title>Devising a Method for Improving Crypto Resistance of the Symmetric Block Cryptosystem RC5 Using Nonlinear Shift Functions</article-title>
          ,
          <string-name>
            <surname>Eastern-European</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Enterp</surname>
          </string-name>
          . Technol.
          <volume>5</volume>
          (
          <issue>9</issue>
          (
          <issue>113</issue>
          )) (
          <year>2021</year>
          )
          <fpage>17</fpage>
          -
          <lpage>29</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2021</year>
          .
          <volume>240344</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shahrzad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Miikkulainen</surname>
          </string-name>
          ,
          <source>Asynchronous Evolution of Deep Neural Network Architectures, Appl. Soft Comput</source>
          .
          <volume>152</volume>
          (
          <year>2024</year>
          )
          <article-title>111209</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.asoc.
          <year>2023</year>
          .
          <volume>111209</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V.</given-names>
            <surname>Luzhetsky</surname>
          </string-name>
          , et al.,
          <source>Adaptive Compression Methods of Data Based on Fibonacci Linear Forms, Proc. SPIE 10445</source>
          , Photonics Applications in Astronomy, Communications, Industry, and
          <source>High Energy Physics Experiments</source>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1117/12.2280944.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>May</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <article-title>Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards</article-title>
          ,
          <source>IACR Transactions on Cryptographic Hardware and Embedded Systems</source>
          <year>2023</year>
          (
          <article-title>4) (</article-title>
          <year>2023</year>
          )
          <fpage>146</fpage>
          -
          <lpage>166</lpage>
          . doi:
          <volume>10</volume>
          .46586/tches.v2023.
          <year>i4</year>
          .
          <fpage>146</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>