=Paper= {{Paper |id=Vol-3800/short5 |storemode=property |title=The practice of block symmetric encryption for a secure Internet connection (short paper) |pdfUrl=https://ceur-ws.org/Vol-3800/short5.pdf |volume=Vol-3800 |authors=Tetiana Korobeinikova,Ihor Zhuravel,Lesya Mychuda,Axel Sikora |dblpUrl=https://dblp.org/rec/conf/csdp/KorobeinikovaZM24 }} ==The practice of block symmetric encryption for a secure Internet connection (short paper)== https://ceur-ws.org/Vol-3800/short5.pdf
                                The practice of block symmetric encryption for a secure
                                Internet connection⋆
                                Tetiana Korobeinikova1,*,†, Ihor Zhuravel1,†, Lesya Mychuda1,† and Axel Sikora2,†
                                1
                                    Lviv Polytechnic National University, 12 Stepana Bandery str., 79000 Lviv, Ukraine
                                2
                                    University of Applied Sciences Offenburg, 24 Badstrasse, 77652 Offenburg, Germany



                                                    Abstract
                                                    The paper discusses the process of block parallelization in the Advanced Encryption Standard (AES) cipher,
                                                    focusing on the Counter (CTR) mode. It details the benefits of this process, including increased data
                                                    processing performance and effective resource utilization; emphasizes the independent encryption of each
                                                    data block in CTR mode, which allows for effective parallelization, especially when handling large data
                                                    volumes. This work outlines the steps involved in the AES operation scheme in CTR mode, from splitting
                                                    data into blocks to generating the final ciphertext. It further explains the concept of a unique “counter” or
                                                    “initialization vector” for each block, which, combined with the key, generates a unique encryption key,
                                                    enabling parallel processing. The idea implementation delves into the programming of the block
                                                    parallelization algorithm using services on the Java Spring Boot platform. It describes the roles of the
                                                    purposed Client Service and Server Service in encrypting and transmitting messages and files and
                                                    decrypting received messages. This work presents an experiment that tests the hypothesis that blocks
                                                    parallelization in AES cipher using CTR mode increases performance during the processing of large data
                                                    volumes. The experiment involves different data volumes and compares the processing speeds of the AES
                                                    algorithm with and without parallelization. The results confirm the hypothesis, showing that block
                                                    parallelization in AES for large data volumes can double the data processing speed compared to the non-
                                                    parallel approach. The paper concludes that block parallelization might be effective not only for the AES
                                                    algorithm but also for any block symmetric algorithm. It also suggests that parallelization allows for more
                                                    efficient use of multi-core systems and reduces the execution time to complete the encryption operation.

                                                    Keywords
                                                    block parallelization, AES cipher, CTR mode, data processing performance, encryption optimization1



                         1. Introduction                                                                The subject is methods and means of protecting connections
                                                                                                        on the Internet, including the analysis of encryption
                         In a world of increasing digital connectivity and Internet                     efficiency.
                         interaction, the issue of connection security is becoming one
                         of the most crucial problems [1–9]. Ensuring the                               2. Related works
                         confidentiality, integrity, and availability of information is
                         becoming a priority [9–11]. This work is focused on                            It is known that the increasing number of digital connections
                         reviewing and improving block symmetric encryption                             during Internet interaction becomes the issue of connection
                         methods aimed at solving the problems of connection                            security. Cristina Del-Real et al. [4] say that the design of
                         security on the Internet. New technologies and encryption                      software systems plays a crucial role in mitigating
                         algorithms are important tools for maintaining data                            cybersecurity incidents; Sood et al. [5] and Jang et al. [9] are
                         confidentiality and ensuring resilience to modern cyber                        paying attention to DoS attacks through HTTP and IP.
                         threats [12–17].                                                                     Gentile et al. In [1] showed the algorithms to ensure
                             Thus, there is a need to analyze, improve, and expand the                  suitable data transmission and encryption ratios and used
                         methodological base of methods and tools that use block                        Transport Layer Security (TLS) tunnels for local sensor data
                         symmetric ciphers.                                                             and secure socket layer tunnels to transmit TLS-encrypted
                             The goal is to improve the methods of block symmetric                      data to a cloud-based central broker. Also, Kampourakis et
                         encryption through the process of block parallelization to                     al. in [3] o er a framework that can accurately detect all
                         solve the problem of secure connections on the Internet.                       anomalous enterprise network activities.
                             The object is the processes associated with the use of                           Nowadays connections to the Internet are connections
                         block encryption algorithms, in the context of their                           to the Cloud. Cloud storage is popular among syudy and
                         application on the Internet and the HTTPS protocol.                            businesses because of cost reduction, performance



                                CSDP-2024: Cyber Security and Data Protection, June 30, 2024, Lviv,             0000-0003-2487-8742 (T. Korobeinikova); 0000-0003-1114-0124
                                Ukraine                                                                     (I. Zhuravel); 0000-0001-8266-1782 (L. Mychuda); 0000-0003-0878-2919
                                ∗ Corresponding author.                                                     (A. Sikora)
                                †
                                  These authors contributed equally.
                                                                                                                          © 2024 Copyright for this paper by its authors. Use permitted under
                                   tetiana.i.korobeinikova@lpnu.ua (T. Korobeinikova);                                    Creative Commons License Attribution 4.0 International (CC BY 4.0).
                                ihor.m.zhuravel@lpnu.ua (I. Zhuravel); lesia.z.mychuda@lpnu.ua
                                (L. Mychuda); axel.sikora@hs-offenburg.de (A. Sikora)
CEUR
Workshop
                  ceur-ws.org
              ISSN 1613-0073
                                                                                                      114
Proceedings
improvement, productivity enhancement, and security.                      of resources. Modern security standards recommend using
However, Alqahtani et al. in [10] are focused on security                 keys of at least 80 bits.
risks since data is stored with third-party providers, and                     Encryption and data transmission are important in
internet access can limit visibility and control. Compared to             wireless networks. There is potential for encrypting test
traditional on-premise computing, data security and                       packets with lightweight encryption algorithms if the
protection are critical concerns in cloud computing.                      security of the device is not compromised. There are
Ensuring data security in the cloud involves various                      numerous encryption algorithms for wired networks, divided
methods, with cryptography being the most crucial                         into two categories: symmetric key encryption and
(Sasikumar and Nagarajan in [11]).                                        asymmetric key encryption. Symmetric key encryption
     So, cryptography provides several security features,                 requires the distribution of a key between the parties before
including authentication, con dentiality, integrity, and                  data is transmitted.
availability.                                                                  Asymmetric key encryption solves the problem of key
     Today, it is important to analyze, improve, and expand               distribution but is computationally intensive. In wireless
the methodological base of methods and tools that use block               devices, symmetric key encryption, such as RC4, is
symmetric ciphers.                                                        predominant, as it is fast and efficient. However, the
     Boura et al. in [14] offer tools and algorithms to search            discovered vulnerabilities in RC4 led to the introduction of a
for related-key distinguishers and attacks of a differential              new security standard for WLANs—IEEE 802.11i, based on
nature against the AES. Yevseiev et al. [15] offer the                    AES. AES is known for its speed, flexibility, and robust
Niederreiter-modified crypto-code structure with additional               security features.
initialization vectors that require an increase in the speed of                Block ciphers, such as AES, are used in WLANs to encrypt
cryptographic transformation of the system as a whole.                    data, ensuring its confidentiality. Security protocols such as
While Opirskyy et al. [16] are working on standardizing                   WPA2 and WPA3 use AES-CCMP to ensure data integrity.
post-quantum cryptography.                                                Block ciphers are also used to authenticate devices and users,
     So, there is a critical need to work on improving the                and to manage encryption keys. They are the core
methods of block symmetric encryption through the process                 components of WLAN security.
of block parallelization to solve the problem of secure                        Block ciphers are used in WLANs to ensure data
connections on the Internet.                                              confidentiality and integrity, as well as device and user
                                                                          authentication. They are standardized, efficient, and scalable,
3. Initial information that                                               making them a reliable choice for securing wireless
                                                                          communications. Overall, they enhance WLAN security by
    establishes research                                                  meeting security standards and requirements.
Stream encryption algorithms. A stream cipher is a type                        Rationale for choosing the AES to solve the problem
of symmetric encryption that encrypts each digit of the                   of secure Internet connection. DES, while a popular
plaintext separately using a key stream. Stream ciphers are               encryption standard in the past, has fallen out of favor due to
faster than block ciphers and require less hardware but can               its limited key length and vulnerability to modern attacks.
be vulnerable to attacks [17–19].                                         AES is known for its high security, efficiency, and wide
     There are two types of stream ciphers: synchronous and               support, making it the best choice for secure Internet
self-synchronizing. Synchronous stream ciphers generate a                 connections. The Twofish algorithm, although it has its
sequence of pseudorandom digits independently of the                      advantages, is not as widespread as AES and is not a standard
plaintext and ciphertext messages. Self-synchronizing stream              for general use.
ciphers use the last N digits of the ciphertext to generate a key              The rationale for choosing AES is based on its
stream [20].                                                              standardization, wide support, high level of security, and
     Block encryption algorithms. A block cipher is an                    efficiency. Its status as a global standard recommended by key
algorithm that encrypts fixed-length data blocks to protect               security institutions such as NIST emphasizes its reliability.
information. Electronic Code Book mode encrypts blocks                    Its ability to work efficiently in real time makes it an ideal
independently, but patterns can be detected. To increase                  choice for secure Internet connection tasks where speed and
security, modes that introduce randomization through an                   security of data transmission are important.
Initialization Vector (IV) are used. Various modes of block                    This choice provides strong encryption, meets modern
cipher operation have been developed and defined in national              requirements, and helps to create secure connections in a
and international standards [21–22]. The basic idea is to                 virtual environment.
introduce randomization of the plaintext data using an IV to                   AES can be slow when processing large amounts of data
achieve probabilistic encryption.                                         for several reasons. First, the AES block size is fixed (typically
     The rationale for using block symmetric encryption                   128 bits), and a large amount of data requires many blocks,
for secure Internet connections. Encryption algorithms                    which can affect the overall speed. In addition, some AES
are known for their high computational requirements,                      modes of operation may include padding operations and
especially for wireless devices with limited resources [23].              other additional operations that can also increase the time
     Encryption guarantees data confidentiality and                       consumption.
protection against interception and plays an important role in                 A large amount of data can lead to additional
authentication, data integrity, and access control.                       computational costs and increased execution time, in cases
     Encrypting even a small amount of data, such as 13.6                 where enhanced security or authentication modes are used.
kilobytes, using a 32-bit Blowfish key can consume about 75%



                                                                    115
To improve the algorithm, a block parallelization mechanism                  Block independence (CTR mode uses encryption
was chosen.                                                                 with a key and unpredictable counter values for each
    The decision to optimize the AES algorithm using block                  block. This allows each block of data to be encrypted
parallelization for secure Internet connections can be                      independently, which is ideal for parallel processing).
justified:                                                                   Ease of implementation and computation (CTR
                                                                            mode is noted for its ease of implementation and
         Large volumes of data: large amounts of data are                  minimized computation, as each block is encrypted
          commonly processed on the Internet, especially                    independently of the others. This makes it effective for
                                                                            use in environments where computing resources are
          when transferring files or in other data-intensive
                                                                            limited).
          scenarios. Block parallelization allows the
                                                                             Parallel processing capability (since each block is
          efficient distribution of encryption tasks among                  encrypted independently, CTR mode lends itself easily
          different computing resources, ensuring fast                      to parallel computing. Different blocks can be processed
          processing.                                                       by different computing units or even on different
         Increased performance: performance is a key                       devices, contributing to speed and efficiency).
          factor in determining the quality of an Internet                   Data Structure Preservation (CTR mode allows
          connection. Parallelization allows you to use                     you to preserve the structure of the original data during
          parallel resources to simultaneously process                      encryption. Each block is replaced by an encrypted
          multiple blocks of data, increasing the speed of                  block of the same length, which avoids data expansion
          encryption and decryption operations.                             or compression during encryption).
                                                                             Note that while CTR mode has many advantages for
    Data security: AES is a secure algorithm, but                       parallel processing, it is important to manage the counter and
improving performance should not compromise security.                   key properly to avoid vulnerabilities. When using CTR mode,
Block parallelization allows for optimal performance                    you should avoid reusing counter values for the same key.
without compromising encryption security.                                    The AES operation scheme in the CTR mode is shown in
                                                                        Fig. 1.
4. The block parallelization process
Parallelization is a key strategy for encryption optimization
aimed at increasing data processing performance in this
work. It will show the main aspects of the block
parallelization process, its benefits, and possible challenges,
and consider how the implementation of block
parallelization helps to optimize the AES cipher for high-
performance information processing tasks.

4.1. Detailed description of the process
When parallelizing blocks and using AES encryption, CTR
(Counter) [24] mode is the most effective strategy, especially
in situations where parallel processing and high performance
are important.
     Optimized parallelization allows to maintenance of high
performance in real-time processing areas where                         Figure 1: Diagram of the AES algorithm in CTR mode
responsiveness to data is key. At the same time, efficient
resource utilization and security ensure that large amounts of          The AES operation scheme in the CTR mode contains the
information are effectively handled, providing an optimal               following steps:
combination of performance and data privacy [25].                            1. Splitting Data into Blocks: the input data is divided
     The choice of AES ciphers in CTR mode for block                    into blocks of fixed size. Each block has a length due to the
parallelization is based on their combination of security,              AES block size (128 bits or 16 bytes).
efficiency, and standardization, namely, keys of different                   2. Generate Counters: a unique counter is created for
lengths (including 256 bits) and implementation speed.                  each block. It generates a unique key for each block.
     In CTR mode, each block of data is encrypted                            3. Encrypting Blocks with AES: the resulting counters
independently, which allows to effectively parallelize the              are used as input for the AES block used in the encryption
encryption process. This is especially important when                   mode. The generated result is XOR'd with the corresponding
processing large amounts of data, where parallel use of                 block of input data, which ensures block encryption.
resources can significantly improve performance.                             4. Counter increment: after the block encryption is
     The combination of AES and CTR modes provides a                    completed, the counter is incremented to generate a new
robust encryption mechanism that can work effectively in a              value for the next block.
parallelized environment, ensuring a high level of security                  5. Repeat the Process for Each Block: All input blocks
and data processing efficiency.                                         are processed similarly, generating unique keys for each.
     The main advantages of using CTR mode when                              6. Generate Ciphertext: the encrypted blocks are
parallelizing blocks:                                                   combined into the final ciphertext.



                                                                  116
4.2. Block parallelization process diagram
The main idea of the AES block parallelization algorithm in
CTR mode is to create independent keys for each data block,
which allows to effectively parallelize the encryption process.
Each block is processed independently, which improves the
speed of processing large amounts of information. The AES
block parallelization scheme in CTR mode is shown in Fig. 2.




Figure 2: Block parallelization scheme

In this mode, a unique “counter” or “initialization vector” is
created for each block, which is combined with the key to
generate a unique encryption key. Thus, each block uses a
different key, and they can be processed in parallel.                   Figure 3: Block diagram of the AES encryption algorithm
     The AES block parallelization algorithm in CTR mode                with block parallelization
(Fig. 3) involves partitioning into blocks, generating unique
counters for each block, encrypting each block independently                 Storing of encrypted blocks: when a block
of the others, and combining the encrypted blocks to produce                completes its work, the encrypted block is saved to a
the final ciphertext.                                                       separate thread that functions as a container for
     The key stream is an important part of the encryption                  collected encrypted blocks. This encrypted block
process, especially when considering parallel computing to                  collection stream can be used for further processing or
encrypt multiple blocks of data simultaneously. The key                     transmission.
stream is used to create unique keys for each block of data.                 Creating of the ciphertext: whet the computation
                                                                            of all blocks is complete, the encrypted blocks are
This is achieved by using a counter and key values. The
                                                                            formed into ciphertext. This text can be used for storage,
counter value is determined by the stream number that points                transmission, or other purposes, ensuring the data
to a specific data block. The key is formed using the result of             confidentiality and integrity.
the Diffie-Hellman algorithm [26], which ensures the security                Using the Diffie-Hellman algorithm: the DH
of key exchange.                                                            algorithm guarantees the security of key exchange by
                                                                            defining a shared secret key between the parties, which
     Parallel computation: all data blocks compute                         ensures the confidentiality of information. The result of
    their keys in a parallel way, which significantly speeds                this algorithm is used as the basis for creating unique
    up the encryption process. Each block uses its key                      keys for each block of data in the stream.
    stream to generate a unique key. This increases the
    efficiency of encryption because the blocks can be                      In general, this process ensures a high level of security
    processed simultaneously without unnecessary delays.                and encryption efficiency for parallel data block computation.




                                                                  117
5. Programming the block                                              messages are saved to a file. Server Service is responsible for
                                                                      encrypting files and sending encrypted files to the client.
    parallelization algorithm                                              To implement this functionality, Java Spring Boot, a
This section describes the process of developing and                  framework for developing web applications and
programming the AES block parallelization algorithm using             microservices, is used. It ensures the configuration and
developed services on the Java Spring Boot platform. These            efficiency of service deployment.
services will interact to securely exchange and process                    The proposed approach ensures a secure and efficient
encrypted messages and files.                                         mechanism for exchanging encrypted messages and files
    Client Service is responsible for messages encrypting             between the client and the server.
and messages transmitting to the server for further                        So, two services, the client and the server, interact with a
processing. It uses AES and keys to encrypt messages. The             secure exchange of secret keys over an unreliable channel
encrypted messages are sent to the server for decryption and          using the Diffie-Hellman algorithm. The structure of the
saving to a file.                                                     server is shown in Fig. 4a and the structure of the client is
    Server Service is responsible for receiving encrypted             shown in Fig. 4b.
messages and decrypting those messages. The decrypted




                                    a)                                                     b)
Figure 4: The structures of developed services

The Server Service diagram of classes is shown in Fig. 5. The
developed Server Service consists of such classes:

    ServerController: handles HTTP requests;
   receives and transmits data between the client and other
   services; initiates calls to other services for data
   processing.
    AESService: implements the AES encryption and
   decryption algorithm. It is used by the ServerController
   to ensure the confidentiality of the exchanged data.
    DataUtils: contains general methods for data
   operations.
    KeyService: handles keys (generation, storage, and
   processing) necessary for data encryption and
   decryption. The ServerController and other services can
   interact with the KeyService to ensure the security of
   the exchanged data.
    ServerService: receives and processes data from
   the ServerController; uses the AESService for
   encryption and decryption, DataUtils for data
   processing, and KeyService for key management.




                                                                      Figure 5: The Server Service diagram of classes

                                                                      The developed Client Service consists of (the diagram of
                                                                      classes is shown in Fig. 6).




                                                                118
                                                                     6. Conclusions
                                                                     6.1. Detailed description of the process
                                                                     It is assumed that the implementation of block parallelization
                                                                     in AES cipher using CTR mode increases performance during
                                                                     processing a large volume of data. The main idea is: that
                                                                     dividing into parallel blocks allows more efficient use of
                                                                     resources and reduces encryption and decryption time. The
                                                                     hypothesis assumes that because of parallelization
                                                                     implementation: (1) processing speed increases; (2) system
                                                                     scalability grows. The experiment contains a comparative
                                                                     analysis of speed and productivity between systems with and
                                                                     without block parallelization in the AES cipher during the
                                                                     processing of a real data volume.

                                                                     6.2. Input data and its analysis
                                                                     For the implementation of an improved AES algorithm, the
                                                                     text data was used. Each data block was defined by a size that
                                                                     corresponds to the AES standard, 128 bits. The considered
                                                                     data volume was determined by the number of blocks that
                                                                     were chosen for encryption. The chosen data volume value
                                                                     corresponded to specific experimental conditions to study the
                                                                     efficiency of parallelization in the algorithm. Input data for
                                                                     the AES algorithm with improved block parallelization came
                                                                     from user input. This considered the variety of algorithm
                                                                     usage scenarios and subjected it to realistic conditions.
                                                                     Algorithm parameters, including block size and data volume,
                                                                     were chosen based on the efficiency check of the
                                                                     improvement.

                                                                     6.3. Working with data
                                                                     Different data volumes were taken and checked by the AES
                                                                     algorithm without parallelization and with it to determine the
                                                                     efficiency of the improvement.
                                                                          To start, check the connection between the two services
                                                                     and generate a key for the algorithm (Fig. 7).

Figure 6: The Client Service diagram of classes

        ClientController: handles HTTP requests from the
         server; receives and transmits data between the
         server and other services; initiates calls to other
         services for data processing.

    Implementation of the proposed process of block
parallelization in the AES cipher in CTR mode based on two
developed services significantly optimizes and improves the
operation of the encryption system. The increase in                  Figure 7: Connecting two services
performance is the result of the efficient use of computing
resources due to the process of parallelizing the processing         For the request_1 in the first test, small data volumes (less
of data blocks. Splitting the tasks between two services             500 blocks) and standard AES algorithm in CTR mode
allows better management of encryption and decryption                without parallelization were used (Fig. 8a). The result is 3
processes, contributing to the system's scalability needs.           milliseconds to encrypt the request_1. Then a request_1 is
                                                                     created with the same data sets, but the algorithm with
                                                                     parallelization is used. (Fig. 8b).




                                                               119
                                   a)                                                            b)
Figure 8: Test 1. Requests execution result with small data volumes

The parallelization does not play a significant role for small         CTR mode without (Fig.9a) and with (Fig. 9b) parallelization
data (it was processed in 3 milliseconds).                             was used. The request_2 was executed in 94 milliseconds,
    For the request_2 in the second test, bigger data volumes          which is 38 milliseconds less than the previous result.
were used (10000 blocks) and the standard AES algorithm in




                                  a)                                                            b)
Figure 9: Test 2. Requests execution result with bigger data volumes

For the request_3 in the third test, big data volumes were             request_3 was processed for 10.39 seconds (Fig.10a) and 6.05
used (1000000 blocks) and the standard AES algorithm in CTR            seconds (Fig. 10b), which is twice as fast as the previous result.
mode without and with parallelization was used. The




                                  a)                                                            b)
Figure 10: Test 3. Requests execution result with big data volumes




                                                                 120
6.4. Implementation results                                                         times to complete the encryption operation compared to the
                                                                                    regular algorithm.
In this section, the results of implementing the AES block
parallelization process are shown. The data processing speeds
with (Table 1) and without (Table 2) parallelization process
                                                                                    7. Conclusions
are compared.                                                                       In this work, a detailed exploration of the block
                                                                                    parallelization process when using the Advanced
Table 1                                                                             Encryption Standard (AES) cipher is presented. The focus is
Processing time        of     the      AES      algorithm      (without             on the Counter (CTR) mode, which is identified as the most
parallelization)                                                                    effective strategy for parallelizing blocks, particularly in
                                                                                    contexts where parallel processing and high performance
                                                                                    are crucial. The benefits of block parallelization, including
  Number of




                                                                   Average
                                                                   Time (s)
   blocks




                Processing Time of the Request (s)                                  block independence, ease of implementation and
                                                                                    computation, parallel processing capability, and data
                                                                                    structure preservation are shown. It also emphasizes the
                                                                     0.             importance of proper management of the counter and key
    500       0.003   0.004     0.004        0.003     0.003                        to avoid vulnerabilities.
                                                                    0034
                                                                     0.                  The process of block parallelization is described in
  10000       0.122   0.117     0.124        0.122     0.119
                                                                    121             detail, from splitting data into blocks, generating counters,
                                                                     10.            encrypting blocks with AES, incrementing the counter,
  1000000     10.90   10.50     10.54        10.42     10.32
                                                                    384             repeating the process for each block, to generating the
                                                                                    ciphertext. The paper highlights that each block is processed
Table 2
                                                                                    independently, which enhances the speed of processing
Processing Time of the Improved AES Algorithm (with
                                                                                    large volumes of information. The development and
parallelization)
                                                                                    programming of the AES block parallelization algorithm
                                                                                    were performed by developing services on the Java Spring
                                                               Average Time




                                                                                    Boot platform. These services interact to securely exchange
  Number of
   blocks




              Processing Time of the Request (s)                                    and process encrypted messages and files. The structure and
                                                                    (s)




                                                                                    functions of the developed Server Service and Client Service
                                                                                    are explained.
                                                                                         The paper presents an experiment that tests the
    500       0.003   0.004    0.003    0.003        0.004     0.0034               hypothesis that the implementation of block parallelization
  10000       0.094   0.089    0.087    0.093        0.090     0.0906               in the AES cipher in CTR mode increases performance
  1000000     5.10    4.89     5.03      4.95        4.10        4.98
                                                                                    during the processing of large volumes of data. The
                                                                                    experiment involves testing two algorithms (with and
                                                                                    without parallelization) for operation speed and efficiency
The speed of encryption and decryption decreases with the                           using different volumes of data. The results of the
data increase.                                                                      experiment confirm the hypothesis. Block parallelization in
                                                                                    AES for big data volumes increases data processing speed
6.5. Hypothesis Confirmation                                                        by two times compared to the non-parallel approach.
The hypothesis about the implementation of block                                    Parallelization allows for more efficient use of multi-core
parallelization in the AES cipher in CTR mode will lead to a                        systems and accelerates the block processing by 50%.
significant improvement in speed and encryption efficiency                          Without parallelization, each block processing is sequential
in the context of processing large volumes of data. An                              and takes a longer execution time.
experiment was conducted that involved testing two                                       The work demonstrates that block parallelization is not
algorithms (with and without parallelization) for operation                         only effective for the AES algorithm but for any block
speed and efficiency.                                                               symmetric algorithm. It provides optimal resource usage,
    For this experiment, different volumes of data were                             reducing the execution time by two times to complete the
used, which could be used in the real world. The experiment                         encryption operation compared to the regular algorithm.
showed that the hypothesis was confirmed, so block                                  This process ensures a high level of security and encryption
parallelization might be effective not only for the AES                             efficiency for parallel data block computation. The proposed
algorithm but for any block symmetric algorithm. The                                approach ensures a secure and efficient mechanism for
experiment showed that block parallelization in AES for big                         exchanging encrypted messages and files between the client
data volumes increases data processing speed by 2 times                             and the server. The increase in performance is the result of
compared to the non-parallel approach. Parallelization                              the efficient use of computing resources due to the process
allows to use of multi-core systems more efficiently and                            of parallelizing the processing of data blocks. Splitting the
accelerates the block processing by 50%. Without                                    tasks between two services allows better management of
parallelization, each block processing is sequential and it                         encryption and decryption processes, contributing to the
takes a longer execution time (10.38 seconds) with                                  system’s scalability needs.
processing over 100,000 blocks. Parallelization provides
optimal resource usage, reducing the execution time by 2



                                                                              121
References                                                                    Future Networks and Distributed Systems (ICFNDS
                                                                              '23) (2024) 548–554. doi: 10.1145/3644713.3644794.
[1]    A. Gentile, et al., A Performance Analysis of Security          [14]   C. Boura, P. Derbez, M. Funk, Related-Key Differential
       Protocols for Distributed Measurement Systems Based                    Analysis of the AES, IACR Transactions on Symmetric
       on Internet of Things with Constrained Hardware and                    Cryptology       2023(4)     (2023)    215–243.    doi:
       Open Source Infrastructures, Sensors 24 (2024) 2781.                   10.46586/tosc.v2023.i4.215-243.
       doi: 10.3390/s24092781.                                         [15]   S. Yevseiev, et al., Development of Niederreiter Hybrid
[2]    M. Baee, L. Simpson, W. Armstrong, Anomaly                             Crypto-code Structure on Flawed Codes, Eastern-
       Detection in the Key-Management Interoperability                       European J. Enterp. Technol. 1(9(97) (2019) 27–38. doi:
       Protocol Using Metadata, in IEEE Open Journal of the                   10.15587/1729-4061.2019.156620.
       Computer Society 5 (2024) 156–169. doi:                         [16]   A. Horpenyuk, I. Opirskyy, P. Vorobets, Analysis of
       10.1109/OJCS.2024.3386715.                                             Problems and Prospects of Implementation of Post-
[3]    V. Kampourakis, G. Makrakis, C. Kolias, From Seek-                     Quantum Cryptographic Algorithms, in: CEUR
       and-Destroy to Split-and-Destroy: Connection                           Workshop Proceedings, vol. 3504 (2023) 39–49.
       Partitioning as an Effective Tool against Low-Rate              [17]   V. Luzhetsky, et al., Adaptive Compression Methods
       DoS Attacks, Future Internet 16 (2024) 137. doi:                       of Data Based on Fibonacci Linear Forms, Proc. SPIE
       10.3390/fi16040137.                                                    10445, Photonics Applications in Astronomy,
[4]    C. Del-Real, E. De Busser, B. van den Berg, Shielding                  Communications, Industry, and High Energy Physics
       Software Systems: A Comparison of Security by                          Experiments (2017). doi: 10.1117/12.2280944.
       Design and Privacy by Design Based on a Systematic              [18]   F.-H. Hsiao, S.-W. Chang, Integrating RC6 Stream
       Literature Review, Computer Law & Security Review                      Cipher to a Chaotic Synchronization System, in IEEE
       52 (2024) 105933. doi: 10.1016/j.clsr.2023.105933.                     Access       12       (2024)     26308–26323.      doi:
[5]    S. Sood, N. Hubballi, SlowTrack: Detecting Slow Rate                   10.1109/ACCESS.2024.3364702.
       Denial of Service Attacks Against HTTP with                     [19]   N. Zidarič, et al., The Welch-gong Stream Cipher—
       Behavioral Parameters, J. Supercomput. 80 (2024)                       Evolutionary Path, Cryptogr. Commun. 16 (2024) 129–
       1788–1817. doi: 10.1007/s11227-023-05453-3.                            165. doi: 10.1007/s12095-023-00656-0.
[6]    O. Harasymchuk et al., Generator of Pseudorandom                [20]   Y. He, et al., Improved Cube Attacks on Some
       Bit Sequence with Increased Cryptographic Security,                    Authenticated Encryption Ciphers and Stream
       Metallurgical and Mining Industry: Sci. Tech. J. 6(5)                  Ciphers in the Internet of Things, IEEE Access 8 (2020)
       (2014) 24–28.                                                          20920–20930. doi: 10.1109/ACCESS.2020.2967 070.
[7]    O. Yudin, et al., Efficiency Assessment of the                  [21]   O. Kara, Lower Data Attacks on Advanced Encryption
       Steganographic Coding Method with Indirect                             Standard, Turkish J. Electrical Eng. Comput. Sci.
       Integration of Critical Information (2019) 2019 IEEE                   32(2(8)) (2024). doi: 10.55730/1300-0632.4072.
       International Conference on Advanced Trends in                  [22]   J. Qiu, Ciphertext Database Audit Technology Under
       Information Theory, ATIT 2019 - Proceedings, pp. 36-                   Searchable Encryption Algorithm and Blockchain
       40.                                                                    Technology, J. Global Inf. Manag. 30(11) (2022) 1–17.
[8]    V. Maksymovych, M. Shabatura, O. Harasymchuk, M.                       doi: 10.4018/JGIM.315014.
       Karpinski, et al., Development of Additive Fibonacci            [23]   A. Sahun, et al., Devising a Method for Improving
       Generators with Improved Characteristics for                           Crypto Resistance of the Symmetric Block
       Cybersecurity Needs. Appl. Sci. (Basel) 2022, 12, 1519,                Cryptosystem RC5 Using Nonlinear Shift Functions,
       doi:10.3390/app12031519.                                               Eastern-European J. Enterp. Technol. 5(9(113)) (2021)
[9]    M. Jang, K. Lee, An Advanced Approach for Detecting                    17–29. doi: 10.15587/1729-4061.2021.240344.
       Behavior-Based Intranet Attacks by Machine                      [24]   J. Liang, H. Shahrzad, R. Miikkulainen, Asynchronous
       Learning, in IEEE Access 12 (2024) 52480–52495. doi:                   Evolution of Deep Neural Network Architectures,
       10.1109/ACCESS.2024.3387016.                                           Appl. Soft Comput. 152 (2024) 111209. doi:
[10]   F. Alqahtani, M. Almutairi, F. Sheldon, Cloud Security                 10.1016/j.asoc.2023.111209.
       Using Fine-Grained Efficient Information Flow                   [25]   V. Luzhetsky, et al., Adaptive Compression Methods
       Tracking, Future Internet 16 (2024) 110. doi:                          of Data Based on Fibonacci Linear Forms, Proc. SPIE
       10.3390/fi16040110.                                                    10445, Photonics Applications in Astronomy,
[11]   K. Sasikumar, S. Nagarajan, Comprehensive Review                       Communications, Industry, and High Energy Physics
       and Analysis of Cryptography Techniques in Cloud                       Experiments (2017). doi: 10.1117/12.2280944.
       Computing, in IEEE Access 12 (2024) 52325–52351.                [26]   A. May, C. Schneider, Dlog is Practically as Hard (or
       doi: 10.1109/ACCESS.20 24.3385449.                                     Easy) as DH – Solving Dlogs via DH Oracles on EC
[12]   T. Luong, N. Cuong, B. Vo, AES Security Improvement                    Standards, IACR Transactions on Cryptographic
       by Utilizing New Key-Dependent XOR Tables, in IEEE                     Hardware and Embedded Systems 2023(4) (2023) 146–
       Access       12       (2024)     53158–53177.      doi:                166. doi: 10.46586/tches.v2023.i4.146-166.
       10.1109/ACCESS.2024.3387268.
[13]   K. Rakhimberdiev, A. Bozorov, M. Berdimurodov,
       Round Key Generation Algorithm Used in Symmetric
       Block Encryption Algorithms to Ensure the Security
       of Economic Systems, 7th International Conference on



                                                                 122