<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The practice of block symmetric encryption for a secure Internet connection ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Tetiana</forename><surname>Korobeinikova</surname></persName>
							<email>tetiana.i.korobeinikova@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepana Bandery str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ihor</forename><surname>Zhuravel</surname></persName>
							<email>ihor.m.zhuravel@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepana Bandery str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lesya</forename><surname>Mychuda</surname></persName>
							<email>lesia.z.mychuda@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepana Bandery str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Axel</forename><surname>Sikora</surname></persName>
							<email>axel.sikora@hs-offenburg.de</email>
							<affiliation key="aff1">
								<orgName type="institution">University of Applied Sciences Offenburg</orgName>
								<address>
									<addrLine>24 Badstrasse</addrLine>
									<postCode>77652</postCode>
									<settlement>Offenburg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The practice of block symmetric encryption for a secure Internet connection ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">8FC863340D980B283DC360E25C52413C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>block parallelization</term>
					<term>AES cipher</term>
					<term>CTR mode</term>
					<term>data processing performance</term>
					<term>encryption optimization1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper discusses the process of block parallelization in the Advanced Encryption Standard (AES) cipher, focusing on the Counter (CTR) mode. It details the benefits of this process, including increased data processing performance and effective resource utilization; emphasizes the independent encryption of each data block in CTR mode, which allows for effective parallelization, especially when handling large data volumes. This work outlines the steps involved in the AES operation scheme in CTR mode, from splitting data into blocks to generating the final ciphertext. It further explains the concept of a unique "counter" or "initialization vector" for each block, which, combined with the key, generates a unique encryption key, enabling parallel processing. The idea implementation delves into the programming of the block parallelization algorithm using services on the Java Spring Boot platform. It describes the roles of the purposed Client Service and Server Service in encrypting and transmitting messages and files and decrypting received messages. This work presents an experiment that tests the hypothesis that blocks parallelization in AES cipher using CTR mode increases performance during the processing of large data volumes. The experiment involves different data volumes and compares the processing speeds of the AES algorithm with and without parallelization. The results confirm the hypothesis, showing that block parallelization in AES for large data volumes can double the data processing speed compared to the nonparallel approach. The paper concludes that block parallelization might be effective not only for the AES algorithm but also for any block symmetric algorithm. It also suggests that parallelization allows for more efficient use of multi-core systems and reduces the execution time to complete the encryption operation.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In a world of increasing digital connectivity and Internet interaction, the issue of connection security is becoming one of the most crucial problems <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref>. Ensuring the confidentiality, integrity, and availability of information is becoming a priority <ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref>. This work is focused on reviewing and improving block symmetric encryption methods aimed at solving the problems of connection security on the Internet. New technologies and encryption algorithms are important tools for maintaining data confidentiality and ensuring resilience to modern cyber threats <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref>.</p><p>Thus, there is a need to analyze, improve, and expand the methodological base of methods and tools that use block symmetric ciphers.</p><p>The goal is to improve the methods of block symmetric encryption through the process of block parallelization to solve the problem of secure connections on the Internet.</p><p>The object is the processes associated with the use of block encryption algorithms, in the context of their application on the Internet and the HTTPS protocol.</p><p>The subject is methods and means of protecting connections on the Internet, including the analysis of encryption efficiency.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related works</head><p>It is known that the increasing number of digital connections during Internet interaction becomes the issue of connection security. Cristina Del-Real et al. <ref type="bibr" target="#b3">[4]</ref> say that the design of software systems plays a crucial role in mitigating cybersecurity incidents; Sood et al. <ref type="bibr" target="#b4">[5]</ref> and Jang et al. <ref type="bibr" target="#b8">[9]</ref> are paying attention to DoS attacks through HTTP and IP.</p><p>Gentile et al. In <ref type="bibr" target="#b0">[1]</ref> showed the algorithms to ensure suitable data transmission and encryption ratios and used Transport Layer Security (TLS) tunnels for local sensor data and secure socket layer tunnels to transmit TLS-encrypted data to a cloud-based central broker. Also, Kampourakis et al. in <ref type="bibr" target="#b2">[3]</ref> o er a framework that can accurately detect all anomalous enterprise network activities.</p><p>Nowadays connections to the Internet are connections to the Cloud. Cloud storage is popular among syudy and businesses because of cost reduction, performance 0000-0003-2487-8742 (T. Korobeinikova); 0000-0003-1114-0124 (I. Zhuravel); 0000-0001-8266-1782 (L. Mychuda); 0000-0003-0878-2919 (A. Sikora) improvement, productivity enhancement, and security. However, Alqahtani et al. in <ref type="bibr" target="#b9">[10]</ref> are focused on security risks since data is stored with third-party providers, and internet access can limit visibility and control. Compared to traditional on-premise computing, data security and protection are critical concerns in cloud computing. Ensuring data security in the cloud involves various methods, with cryptography being the most crucial (Sasikumar and Nagarajan in <ref type="bibr" target="#b10">[11]</ref>).</p><p>So, cryptography provides several security features, including authentication, con dentiality, integrity, and availability.</p><p>Today, it is important to analyze, improve, and expand the methodological base of methods and tools that use block symmetric ciphers.</p><p>Boura et al. in <ref type="bibr" target="#b13">[14]</ref> offer tools and algorithms to search for related-key distinguishers and attacks of a differential nature against the AES. Yevseiev et al. <ref type="bibr" target="#b14">[15]</ref> offer the Niederreiter-modified crypto-code structure with additional initialization vectors that require an increase in the speed of cryptographic transformation of the system as a whole. While Opirskyy et al. <ref type="bibr" target="#b15">[16]</ref> are working on standardizing post-quantum cryptography.</p><p>So, there is a critical need to work on improving the methods of block symmetric encryption through the process of block parallelization to solve the problem of secure connections on the Internet.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Initial information that establishes research</head><p>Stream encryption algorithms. A stream cipher is a type of symmetric encryption that encrypts each digit of the plaintext separately using a key stream. Stream ciphers are faster than block ciphers and require less hardware but can be vulnerable to attacks <ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref>.</p><p>There are two types of stream ciphers: synchronous and self-synchronizing. Synchronous stream ciphers generate a sequence of pseudorandom digits independently of the plaintext and ciphertext messages. Self-synchronizing stream ciphers use the last N digits of the ciphertext to generate a key stream <ref type="bibr" target="#b19">[20]</ref>.</p><p>Block encryption algorithms. A block cipher is an algorithm that encrypts fixed-length data blocks to protect information. Electronic Code Book mode encrypts blocks independently, but patterns can be detected. To increase security, modes that introduce randomization through an Initialization Vector (IV) are used. Various modes of block cipher operation have been developed and defined in national and international standards <ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref>. The basic idea is to introduce randomization of the plaintext data using an IV to achieve probabilistic encryption.</p><p>The rationale for using block symmetric encryption for secure Internet connections. Encryption algorithms are known for their high computational requirements, especially for wireless devices with limited resources <ref type="bibr" target="#b22">[23]</ref>.</p><p>Encryption guarantees data confidentiality and protection against interception and plays an important role in authentication, data integrity, and access control.</p><p>Encrypting even a small amount of data, such as 13.6 kilobytes, using a 32-bit Blowfish key can consume about 75% of resources. Modern security standards recommend using keys of at least 80 bits.</p><p>Encryption and data transmission are important in wireless networks. There is potential for encrypting test packets with lightweight encryption algorithms if the security of the device is not compromised. There are numerous encryption algorithms for wired networks, divided into two categories: symmetric key encryption and asymmetric key encryption. Symmetric key encryption requires the distribution of a key between the parties before data is transmitted.</p><p>Asymmetric key encryption solves the problem of key distribution but is computationally intensive. In wireless devices, symmetric key encryption, such as RC4, is predominant, as it is fast and efficient. However, the discovered vulnerabilities in RC4 led to the introduction of a new security standard for WLANs-IEEE 802.11i, based on AES. AES is known for its speed, flexibility, and robust security features.</p><p>Block ciphers, such as AES, are used in WLANs to encrypt data, ensuring its confidentiality. Security protocols such as WPA2 and WPA3 use AES-CCMP to ensure data integrity. Block ciphers are also used to authenticate devices and users, and to manage encryption keys. They are the core components of WLAN security.</p><p>Block ciphers are used in WLANs to ensure data confidentiality and integrity, as well as device and user authentication. They are standardized, efficient, and scalable, making them a reliable choice for securing wireless communications. Overall, they enhance WLAN security by meeting security standards and requirements.</p><p>Rationale for choosing the AES to solve the problem of secure Internet connection. DES, while a popular encryption standard in the past, has fallen out of favor due to its limited key length and vulnerability to modern attacks. AES is known for its high security, efficiency, and wide support, making it the best choice for secure Internet connections. The Twofish algorithm, although it has its advantages, is not as widespread as AES and is not a standard for general use.</p><p>The rationale for choosing AES is based on its standardization, wide support, high level of security, and efficiency. Its status as a global standard recommended by key security institutions such as NIST emphasizes its reliability. Its ability to work efficiently in real time makes it an ideal choice for secure Internet connection tasks where speed and security of data transmission are important.</p><p>This choice provides strong encryption, meets modern requirements, and helps to create secure connections in a virtual environment.</p><p>AES can be slow when processing large amounts of data for several reasons. First, the AES block size is fixed (typically 128 bits), and a large amount of data requires many blocks, which can affect the overall speed. In addition, some AES modes of operation may include padding operations and other additional operations that can also increase the time consumption.</p><p>A large amount of data can lead to additional computational costs and increased execution time, in cases where enhanced security or authentication modes are used.</p><p>To improve the algorithm, a block parallelization mechanism was chosen.</p><p>The decision to optimize the AES algorithm using block parallelization for secure Internet connections can be justified: Data security: AES is a secure algorithm, but improving performance should not compromise security. Block parallelization allows for optimal performance without compromising encryption security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">The block parallelization process</head><p>Parallelization is a key strategy for encryption optimization aimed at increasing data processing performance in this work. It will show the main aspects of the block parallelization process, its benefits, and possible challenges, and consider how the implementation of block parallelization helps to optimize the AES cipher for highperformance information processing tasks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Detailed description of the process</head><p>When parallelizing blocks and using AES encryption, CTR (Counter) <ref type="bibr" target="#b23">[24]</ref> mode is the most effective strategy, especially in situations where parallel processing and high performance are important.</p><p>Optimized parallelization allows to maintenance of high performance in real-time processing areas where responsiveness to data is key. At the same time, efficient resource utilization and security ensure that large amounts of information are effectively handled, providing an optimal combination of performance and data privacy <ref type="bibr" target="#b24">[25]</ref>.</p><p>The choice of AES ciphers in CTR mode for block parallelization is based on their combination of security, efficiency, and standardization, namely, keys of different lengths (including 256 bits) and implementation speed.</p><p>In CTR mode, each block of data is encrypted independently, which allows to effectively parallelize the encryption process. This is especially important when processing large amounts of data, where parallel use of resources can significantly improve performance.</p><p>The combination of AES and CTR modes provides a robust encryption mechanism that can work effectively in a parallelized environment, ensuring a high level of security and data processing efficiency.</p><p>The main advantages of using CTR mode when parallelizing blocks:  Block independence (CTR mode uses encryption with a key and unpredictable counter values for each block. This allows each block of data to be encrypted independently, which is ideal for parallel processing).  Ease of implementation and computation (CTR mode is noted for its ease of implementation and minimized computation, as each block is encrypted independently of the others. This makes it effective for use in environments where computing resources are limited).  Parallel processing capability (since each block is encrypted independently, CTR mode lends itself easily to parallel computing. Different blocks can be processed by different computing units or even on different devices, contributing to speed and efficiency).  Data Structure Preservation (CTR mode allows you to preserve the structure of the original data during encryption. Each block is replaced by an encrypted block of the same length, which avoids data expansion or compression during encryption).</p><p>Note that while CTR mode has many advantages for parallel processing, it is important to manage the counter and key properly to avoid vulnerabilities. When using CTR mode, you should avoid reusing counter values for the same key.</p><p>The AES operation scheme in the CTR mode is shown in Fig. <ref type="figure">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Diagram of the AES algorithm in CTR mode</head><p>The AES operation scheme in the CTR mode contains the following steps:</p><p>1. Splitting Data into Blocks: the input data is divided into blocks of fixed size. Each block has a length due to the AES block size (128 bits or 16 bytes).</p><p>2. Generate Counters: a unique counter is created for each block. It generates a unique key for each block.</p><p>3. Encrypting Blocks with AES: the resulting counters are used as input for the AES block used in the encryption mode. The generated result is XOR'd with the corresponding block of input data, which ensures block encryption.</p><p>4. Counter increment: after the block encryption is completed, the counter is incremented to generate a new value for the next block.</p><p>5. Repeat the Process for Each Block: All input blocks are processed similarly, generating unique keys for each.</p><p>6. Generate Ciphertext: the encrypted blocks are combined into the final ciphertext.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Block parallelization process diagram</head><p>The main idea of the AES block parallelization algorithm in CTR mode is to create independent keys for each data block, which allows to effectively parallelize the encryption process. Each block is processed independently, which improves the speed of processing large amounts of information. The AES block parallelization scheme in CTR mode is shown in Fig. <ref type="figure" target="#fig_1">2</ref>. In this mode, a unique "counter" or "initialization vector" is created for each block, which is combined with the key to generate a unique encryption key. Thus, each block uses a different key, and they can be processed in parallel.</p><p>The AES block parallelization algorithm in CTR mode (Fig. <ref type="figure" target="#fig_2">3</ref>) involves partitioning into blocks, generating unique counters for each block, encrypting each block independently of the others, and combining the encrypted blocks to produce the final ciphertext.</p><p>The key stream is an important part of the encryption process, especially when considering parallel computing to encrypt multiple blocks of data simultaneously. The key stream is used to create unique keys for each block of data. This is achieved by using a counter and key values. The counter value is determined by the stream number that points to a specific data block. The key is formed using the result of the Diffie-Hellman algorithm <ref type="bibr" target="#b25">[26]</ref>, which ensures the security of key exchange.</p><p> Parallel computation: all data blocks compute their keys in a parallel way, which significantly speeds up the encryption process. Each block uses its key stream to generate a unique key. This increases the efficiency of encryption because the blocks can be processed simultaneously without unnecessary delays.  Storing of encrypted blocks: when a block completes its work, the encrypted block is saved to a separate thread that functions as a container for collected encrypted blocks. This encrypted block collection stream can be used for further processing or transmission.  Creating of the ciphertext: whet the computation of all blocks is complete, the encrypted blocks are formed into ciphertext. This text can be used for storage, transmission, or other purposes, ensuring the data confidentiality and integrity.  Using the Diffie-Hellman algorithm: the DH algorithm guarantees the security of key exchange by defining a shared secret key between the parties, which ensures the confidentiality of information. The result of this algorithm is used as the basis for creating unique keys for each block of data in the stream.</p><p>In general, this process ensures a high level of security and encryption efficiency for parallel data block computation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Programming the block parallelization algorithm</head><p>This section describes the process of developing and programming the AES block parallelization algorithm using developed services on the Java Spring Boot platform. These services will interact to securely exchange and process encrypted messages and files.</p><p>Client Service is responsible for messages encrypting and messages transmitting to the server for further processing. It uses AES and keys to encrypt messages. The encrypted messages are sent to the server for decryption and saving to a file.</p><p>Server Service is responsible for receiving encrypted messages and decrypting those messages. The decrypted messages are saved to a file. Server Service is responsible for encrypting files and sending encrypted files to the client.</p><p>To implement this functionality, Java Spring Boot, a framework for developing web applications and microservices, is used. It ensures the configuration and efficiency of service deployment.</p><p>The proposed approach ensures a secure and efficient mechanism for exchanging encrypted messages and files between the client and the server.</p><p>So, two services, the client and the server, interact with a secure exchange of secret keys over an unreliable channel using the Diffie-Hellman algorithm. The structure of the server is shown in Fig. <ref type="figure" target="#fig_3">4a</ref>    </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>ClientController: handles HTTP requests from the server; receives and transmits data between the server and other services; initiates calls to other services for data processing.</p><p>Implementation of the proposed process of block parallelization in the AES cipher in CTR mode based on two developed services significantly optimizes and improves the operation of the encryption system. The increase in performance is the result of the efficient use of computing resources due to the process of parallelizing the processing of data blocks. Splitting the tasks between two services allows better management of encryption and decryption processes, contributing to the system's scalability needs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions 6.1. Detailed description of the process</head><p>It is assumed that the implementation of block parallelization in AES cipher using CTR mode increases performance during processing a large volume of data. The main idea is: that dividing into parallel blocks allows more efficient use of resources and reduces encryption and decryption time. The hypothesis assumes that because of parallelization implementation: (1) processing speed increases; ( <ref type="formula">2</ref>) system scalability grows. The experiment contains a comparative analysis of speed and productivity between systems with and without block parallelization in the AES cipher during the processing of a real data volume.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2.">Input data and its analysis</head><p>For the implementation of an improved AES algorithm, the text data was used. Each data block was defined by a size that corresponds to the AES standard, 128 bits. The considered data volume was determined by the number of blocks that were chosen for encryption. The chosen data volume value corresponded to specific experimental conditions to study the efficiency of parallelization in the algorithm. Input data for the AES algorithm with improved block parallelization came from user input. This considered the variety of algorithm usage scenarios and subjected it to realistic conditions. Algorithm parameters, including block size and data volume, were chosen based on the efficiency check of the improvement.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3.">Working with data</head><p>Different data volumes were taken and checked by the AES algorithm without parallelization and with it to determine the efficiency of the improvement.</p><p>To start, check the connection between the two services and generate a key for the algorithm (Fig. <ref type="figure" target="#fig_6">7</ref>). For the request_1 in the first test, small data volumes (less 500 blocks) and standard AES algorithm in CTR mode without parallelization were used (Fig. <ref type="figure" target="#fig_7">8a</ref>). The result is 3 milliseconds to encrypt the request_1. Then a request_1 is created with the same data sets, but the algorithm with parallelization is used. (Fig. <ref type="figure" target="#fig_7">8b</ref>). The parallelization does not play a significant role for small data (it was processed in 3 milliseconds).</p><p>For the request_2 in the second test, bigger data volumes were used (10000 blocks) and the standard AES algorithm in CTR mode without (Fig. <ref type="figure" target="#fig_8">9a</ref>) and with (Fig. <ref type="figure" target="#fig_8">9b</ref>) parallelization was used. The request_2 was executed in 94 milliseconds, which is 38 milliseconds less than the previous result. For the request_3 in the third test, big data volumes were used (1000000 blocks) and the standard AES algorithm in CTR mode without and with parallelization was used. The request_3 was processed for 10.39 seconds (Fig. <ref type="figure" target="#fig_9">10a</ref>) and 6.05 seconds (Fig. <ref type="figure" target="#fig_9">10b</ref>), which is twice as fast as the previous result. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.4.">Implementation results</head><p>In this section, the results of implementing the AES block parallelization process are shown. The data processing speeds with (Table <ref type="table" target="#tab_0">1</ref>) and without (Table <ref type="table" target="#tab_1">2</ref>) parallelization process are compared. The speed of encryption and decryption decreases with the data increase.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.5.">Hypothesis Confirmation</head><p>The hypothesis about the implementation of block parallelization in the AES cipher in CTR mode will lead to a significant improvement in speed and encryption efficiency in the context of processing large volumes of data. An experiment was conducted that involved testing two algorithms (with and without parallelization) for operation speed and efficiency. For this experiment, different volumes of data were used, which could be used in the real world. The experiment showed that the hypothesis was confirmed, so block parallelization might be effective not only for the AES algorithm but for any block symmetric algorithm. The experiment showed that block parallelization in AES for big data volumes increases data processing speed by 2 times compared to the non-parallel approach. Parallelization allows to use of multi-core systems more efficiently and accelerates the block processing by 50%. Without parallelization, each block processing is sequential and it takes a longer execution time (10.38 seconds) with processing over 100,000 blocks. Parallelization provides optimal resource usage, reducing the execution time by 2 times to complete the encryption operation compared to the regular algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusions</head><p>In this work, a detailed exploration of the block parallelization process when using the Advanced Encryption Standard (AES) cipher is presented. The focus is on the Counter (CTR) mode, which is identified as the most effective strategy for parallelizing blocks, particularly in contexts where parallel processing and high performance are crucial. The benefits of block parallelization, including block independence, ease of implementation and computation, parallel processing capability, and data structure preservation are shown. It also emphasizes the importance of proper management of the counter and key to avoid vulnerabilities.</p><p>The process of block parallelization is described in detail, from splitting data into blocks, generating counters, encrypting blocks with AES, incrementing the counter, repeating the process for each block, to generating the ciphertext. The paper highlights that each block is processed independently, which enhances the speed of processing large volumes of information. The development and programming of the AES block parallelization algorithm were performed by developing services on the Java Spring Boot platform. These services interact to securely exchange and process encrypted messages and files. The structure and functions of the developed Server Service and Client Service are explained.</p><p>The paper presents an experiment that tests the hypothesis that the implementation of block parallelization in the AES cipher in CTR mode increases performance during the processing of large volumes of data. The experiment involves testing two algorithms (with and without parallelization) for operation speed and efficiency using different volumes of data. The results of the experiment confirm the hypothesis. Block parallelization in AES for big data volumes increases data processing speed by two times compared to the non-parallel approach. Parallelization allows for more efficient use of multi-core systems and accelerates the block processing by 50%. Without parallelization, each block processing is sequential and takes a longer execution time.</p><p>The work demonstrates that block parallelization is not only effective for the AES algorithm but for any block symmetric algorithm. It provides optimal resource usage, reducing the execution time by two times to complete the encryption operation compared to the regular algorithm. This process ensures a high level of security and encryption efficiency for parallel data block computation. The proposed approach ensures a secure and efficient mechanism for exchanging encrypted messages and files between the client and the server. The increase in performance is the result of the efficient use of computing resources due to the process of parallelizing the processing of data blocks. Splitting the tasks between two services allows better management of encryption and decryption processes, contributing to the system's scalability needs.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>Large volumes of data: large amounts of data are commonly processed on the Internet, especially when transferring files or in other data-intensive scenarios. Block parallelization allows the efficient distribution of encryption tasks among different computing resources, ensuring fast processing.  Increased performance: performance is a key factor in determining the quality of an Internet connection. Parallelization allows you to use parallel resources to simultaneously process multiple blocks of data, increasing the speed of encryption and decryption operations.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Block parallelization scheme</figDesc><graphic coords="4,74.16,169.92,213.84,262.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Block diagram of the AES encryption algorithm with block parallelization</figDesc><graphic coords="4,314.64,71.76,198.24,417.84" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>and the structure of the client is shown in Fig. 4b. a) b) The structures of developed services The Server Service diagram of classes is shown in Fig. 5. The developed Server Service consists of such classes:  ServerController: handles HTTP requests; receives and transmits data between the client and other services; initiates calls to other services for data processing.  AESService: implements the AES encryption and decryption algorithm. It is used by the ServerController to ensure the confidentiality of the exchanged data.  DataUtils: contains general methods for data operations.  KeyService: handles keys (generation, storage, and processing) necessary for data encryption and decryption. The ServerController and other services can interact with the KeyService to ensure the security of the exchanged data.  ServerService: receives and processes data from the ServerController; uses the AESService for encryption and decryption, DataUtils for data processing, and KeyService for key management.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: The Server Service diagram of classesThe developed Client Service consists of (the diagram of classes is shown in Fig.6).</figDesc><graphic coords="5,304.80,421.68,217.44,266.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: The Client Service diagram of classes</figDesc><graphic coords="6,76.56,71.76,208.80,431.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Connecting two services</figDesc><graphic coords="6,305.04,505.44,217.68,107.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 8 :</head><label>8</label><figDesc>Test 1. Requests execution result with small data volumes</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 9 :</head><label>9</label><figDesc>Test 2. Requests execution result with bigger data volumes</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 10 :</head><label>10</label><figDesc>Test 3. Requests execution result with big data volumes</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Processing time of the AES algorithm (without parallelization)</figDesc><table><row><cell>Number of</cell><cell>blocks</cell><cell cols="4">Processing Time of the Request (s)</cell><cell>Average</cell><cell>Time (s)</cell></row><row><cell cols="2">500</cell><cell>0.003 0.004</cell><cell>0.004</cell><cell>0.003</cell><cell>0.003</cell><cell>0. 0034</cell></row><row><cell cols="2">10000</cell><cell>0.122 0.117</cell><cell>0.124</cell><cell>0.122</cell><cell>0.119</cell><cell>0. 121</cell></row><row><cell cols="3">1000000 10.90 10.50</cell><cell>10.54</cell><cell>10.42</cell><cell>10.32</cell><cell>10. 384</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Processing Time of the Improved AES Algorithm (with parallelization)</figDesc><table><row><cell>Number of</cell><cell>blocks</cell><cell cols="5">Processing Time of the Request (s)</cell><cell>Average Time</cell><cell>(s)</cell></row><row><cell cols="2">500</cell><cell>0.003</cell><cell cols="3">0.004 0.003 0.003</cell><cell>0.004</cell><cell>0.0034</cell></row><row><cell cols="2">10000</cell><cell>0.094</cell><cell cols="3">0.089 0.087 0.093</cell><cell>0.090</cell><cell>0.0906</cell></row><row><cell cols="2">1000000</cell><cell>5.10</cell><cell>4.89</cell><cell>5.03</cell><cell>4.95</cell><cell>4.10</cell><cell>4.98</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gentile</surname></persName>
		</author>
		<idno type="DOI">10.3390/s24092781</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page">2781</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata</title>
		<author>
			<persName><forename type="first">M</forename><surname>Baee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Simpson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Armstrong</surname></persName>
		</author>
		<idno type="DOI">10.1109/OJCS.2024.3386715</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Open Journal of the Computer Society</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="156" to="169" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">From Seekand-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kampourakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Makrakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kolias</surname></persName>
		</author>
		<idno type="DOI">10.3390/fi16040137</idno>
	</analytic>
	<monogr>
		<title level="j">Future Internet</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page">137</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Shielding Software Systems: A Comparison of Security by Design and Privacy by Design Based on a Systematic Literature Review</title>
		<author>
			<persName><forename type="first">C</forename><surname>Del-Real</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">De</forename><surname>Busser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Van Den</surname></persName>
		</author>
		<author>
			<persName><surname>Berg</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.clsr.2023.105933</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Law &amp; Security Review</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="page">105933</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">SlowTrack: Detecting Slow Rate Denial of Service Attacks Against HTTP with Behavioral Parameters</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Hubballi</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11227-023-05453-3</idno>
	</analytic>
	<monogr>
		<title level="j">J. Supercomput</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="page" from="1788" to="1817" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Generator of Pseudorandom Bit Sequence with Increased Cryptographic Security</title>
		<author>
			<persName><forename type="first">O</forename><surname>Harasymchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Metallurgical and Mining Industry: Sci. Tech. J</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="24" to="28" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information</title>
		<author>
			<persName><forename type="first">O</forename><surname>Yudin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Advanced Trends in Information Theory, ATIT 2019 -Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="36" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Development of Additive Fibonacci Generators with Improved Characteristics for Cybersecurity Needs</title>
		<author>
			<persName><forename type="first">V</forename><surname>Maksymovych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Shabatura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Harasymchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Karpinski</surname></persName>
		</author>
		<idno type="DOI">10.3390/app12031519</idno>
	</analytic>
	<monogr>
		<title level="j">Appl. Sci</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page">1519</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Lee</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2024.3387016</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="52480" to="52495" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Cloud Security Using Fine-Grained Efficient Information Flow Tracking</title>
		<author>
			<persName><forename type="first">F</forename><surname>Alqahtani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Almutairi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Sheldon</surname></persName>
		</author>
		<idno type="DOI">10.3390/fi16040110</idno>
	</analytic>
	<monogr>
		<title level="j">Future Internet</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page">110</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing</title>
		<author>
			<persName><forename type="first">K</forename><surname>Sasikumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nagarajan</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2024.3385449</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="52325" to="52351" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">AES Security Improvement by Utilizing New Key-Dependent XOR Tables</title>
		<author>
			<persName><forename type="first">T</forename><surname>Luong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Cuong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Vo</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2024.3387268</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="53158" to="53177" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Round Key Generation Algorithm Used in Symmetric Block Encryption Algorithms to Ensure the Security of Economic Systems</title>
		<author>
			<persName><forename type="first">K</forename><surname>Rakhimberdiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bozorov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Berdimurodov</surname></persName>
		</author>
		<idno type="DOI">10.1145/3644713.3644794</idno>
	</analytic>
	<monogr>
		<title level="m">7th International Conference on Future Networks and Distributed Systems (ICFNDS &apos;23)</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="548" to="554" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Related-Key Differential Analysis of the AES</title>
		<author>
			<persName><forename type="first">C</forename><surname>Boura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Derbez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Funk</surname></persName>
		</author>
		<idno type="DOI">10.46586/tosc.v2023.i4.215-243</idno>
	</analytic>
	<monogr>
		<title level="j">IACR Transactions on Symmetric Cryptology</title>
		<imprint>
			<biblScope unit="volume">2023</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="215" to="243" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Development of Niederreiter Hybrid Crypto-code Structure on Flawed Codes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yevseiev</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2019.156620</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European J. Enterp. Technol</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="27" to="38" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Analysis of Problems and Prospects of Implementation of Post-Quantum Cryptographic Algorithms</title>
		<author>
			<persName><forename type="first">A</forename><surname>Horpenyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Opirskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Vorobets</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">3504</biblScope>
			<biblScope unit="page" from="39" to="49" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Adaptive Compression Methods of Data Based on Fibonacci Linear Forms</title>
		<author>
			<persName><forename type="first">V</forename><surname>Luzhetsky</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2280944</idno>
	</analytic>
	<monogr>
		<title level="m">Proc. SPIE 10445</title>
				<meeting>SPIE 10445</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Integrating RC6 Stream Cipher to a Chaotic Synchronization System</title>
		<author>
			<persName><forename type="first">F.-H</forename><surname>Hsiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-W</forename><surname>Chang</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2024.3364702</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="26308" to="26323" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">The Welch-gong Stream Cipher-Evolutionary Path</title>
		<author>
			<persName><forename type="first">N</forename><surname>Zidarič</surname></persName>
		</author>
		<idno type="DOI">10.1007/s12095-023-00656-0</idno>
	</analytic>
	<monogr>
		<title level="j">Cryptogr. Commun</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="129" to="165" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things</title>
		<author>
			<persName><forename type="first">Y</forename><surname>He</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.2967070</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="20920" to="20930" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Lower Data Attacks on Advanced Encryption Standard</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kara</surname></persName>
		</author>
		<idno type="DOI">10.55730/1300-0632.4072</idno>
	</analytic>
	<monogr>
		<title level="j">Turkish J. Electrical Eng. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology</title>
		<author>
			<persName><forename type="first">J</forename><surname>Qiu</surname></persName>
		</author>
		<idno type="DOI">10.4018/JGIM.315014</idno>
	</analytic>
	<monogr>
		<title level="j">J. Global Inf. Manag</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="1" to="17" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Devising a Method for Improving Crypto Resistance of the Symmetric Block Cryptosystem RC5 Using Nonlinear Shift Functions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sahun</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2021.240344</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European J. Enterp. Technol</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="17" to="29" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Asynchronous Evolution of Deep Neural Network Architectures</title>
		<author>
			<persName><forename type="first">J</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Shahrzad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Miikkulainen</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.asoc.2023.111209</idno>
	</analytic>
	<monogr>
		<title level="j">Appl. Soft Comput</title>
		<imprint>
			<biblScope unit="volume">152</biblScope>
			<biblScope unit="page">111209</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Adaptive Compression Methods of Data Based on Fibonacci Linear Forms</title>
		<author>
			<persName><forename type="first">V</forename><surname>Luzhetsky</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2280944</idno>
	</analytic>
	<monogr>
		<title level="m">Proc. SPIE 10445</title>
				<meeting>SPIE 10445</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Dlog is Practically as Hard (or Easy) as DH -Solving Dlogs via DH Oracles on EC Standards</title>
		<author>
			<persName><forename type="first">A</forename><surname>May</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Schneider</surname></persName>
		</author>
		<idno type="DOI">10.46586/tches.v2023.i4.146-166</idno>
	</analytic>
	<monogr>
		<title level="j">IACR Transactions on Cryptographic Hardware and Embedded Systems</title>
		<imprint>
			<biblScope unit="volume">2023</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="146" to="166" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
