Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length. Indeed, increasing the number of bits that conforms the key used by a symmetric cryptography algorithm will increase its security level with...
- Autores:
-
Cevallos Salas, David Fabián
- Tipo de recurso:
- Fecha de publicación:
- 2019
- Institución:
- Universidad EAFIT
- Repositorio:
- Repositorio EAFIT
- Idioma:
- eng
- OAI Identifier:
- oai:repository.eafit.edu.co:10784/14376
- Acceso en línea:
- http://hdl.handle.net/10784/14376
- Palabra clave:
- Cryptography
Symmetric Key
Rc5
Algorithm
Performance
Criptografía
Clave Simétrica
Rc5
Algoritmo
Rendimiento
- Rights
- License
- Copyright (c) 2019 David Fabián Cevallos Salas
id |
REPOEAFIT2_1e3ec776197a01e205298069a0513727 |
---|---|
oai_identifier_str |
oai:repository.eafit.edu.co:10784/14376 |
network_acronym_str |
REPOEAFIT2 |
network_name_str |
Repositorio EAFIT |
repository_id_str |
|
dc.title.eng.fl_str_mv |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks |
dc.title.spa.fl_str_mv |
Algoritmo RC5 mejorado usando computación paralela para redes de comunicación |
title |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks |
spellingShingle |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks Cryptography Symmetric Key Rc5 Algorithm Performance Criptografía Clave Simétrica Rc5 Algoritmo Rendimiento |
title_short |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks |
title_full |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks |
title_fullStr |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks |
title_full_unstemmed |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks |
title_sort |
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks |
dc.creator.fl_str_mv |
Cevallos Salas, David Fabián |
dc.contributor.author.spa.fl_str_mv |
Cevallos Salas, David Fabián |
dc.contributor.affiliation.spa.fl_str_mv |
Universidad Tecnológica Equinoccial |
dc.subject.keyword.eng.fl_str_mv |
Cryptography Symmetric Key Rc5 Algorithm Performance |
topic |
Cryptography Symmetric Key Rc5 Algorithm Performance Criptografía Clave Simétrica Rc5 Algoritmo Rendimiento |
dc.subject.keyword.spa.fl_str_mv |
Criptografía Clave Simétrica Rc5 Algoritmo Rendimiento |
description |
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length. Indeed, increasing the number of bits that conforms the key used by a symmetric cryptography algorithm will increase its security level with a cost on its performance. Expanding a key in symmetric cryptography is not an easy task due to algorithms are designed to work with keys of a fixed maximum length. This paper presents an alternative design of the RC5 cryptography algorithm with an enhanced security level achieved through a key expansion mechanism with Parallel Computing processing. Although the design was created for the RC5 algorithm the main idea might be applied to other block cipher algorithms applying the same criteria. This methodology makes feasible to obtain a robust symmetric key algorithm implemented in software with an acceptable performance in comparison with other techniques such as implementations in hardware, reduction in the amount of data, improvements in the key exchange process, advanced high performance computing, and many others techniques. |
publishDate |
2019 |
dc.date.available.none.fl_str_mv |
2019-11-22T16:03:59Z |
dc.date.issued.none.fl_str_mv |
2019-06-04 |
dc.date.accessioned.none.fl_str_mv |
2019-11-22T16:03:59Z |
dc.date.none.fl_str_mv |
2019-06-04 |
dc.type.eng.fl_str_mv |
article info:eu-repo/semantics/article publishedVersion info:eu-repo/semantics/publishedVersion |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.local.spa.fl_str_mv |
Artículo |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
2256-4314 1794-9165 |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10784/14376 |
dc.identifier.doi.none.fl_str_mv |
10.17230/ingciencia.15.29.4 |
identifier_str_mv |
2256-4314 1794-9165 10.17230/ingciencia.15.29.4 |
url |
http://hdl.handle.net/10784/14376 |
dc.language.iso.eng.fl_str_mv |
eng |
language |
eng |
dc.relation.isversionof.none.fl_str_mv |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474 |
dc.relation.uri.none.fl_str_mv |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474 |
dc.rights.eng.fl_str_mv |
Copyright (c) 2019 David Fabián Cevallos Salas |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.local.spa.fl_str_mv |
Acceso abierto |
rights_invalid_str_mv |
Copyright (c) 2019 David Fabián Cevallos Salas Acceso abierto http://purl.org/coar/access_right/c_abf2 |
dc.format.none.fl_str_mv |
application/pdf |
dc.coverage.spatial.eng.fl_str_mv |
Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees |
dc.publisher.spa.fl_str_mv |
Universidad EAFIT |
dc.source.none.fl_str_mv |
instname:Universidad EAFIT reponame:Repositorio Institucional Universidad EAFIT |
dc.source.spa.fl_str_mv |
Ingeniería y Ciencia; Vol 15, No 29 (2019) |
instname_str |
Universidad EAFIT |
institution |
Universidad EAFIT |
reponame_str |
Repositorio Institucional Universidad EAFIT |
collection |
Repositorio Institucional Universidad EAFIT |
bitstream.url.fl_str_mv |
https://repository.eafit.edu.co/bitstreams/574d1c36-d18b-46e9-ac6e-0c76a1ce9732/download https://repository.eafit.edu.co/bitstreams/c5de9f13-68a8-43df-ac5b-b202303523a3/download https://repository.eafit.edu.co/bitstreams/8f4af3a3-f546-4e02-87ef-c7de57b36ab4/download |
bitstream.checksum.fl_str_mv |
da9b21a5c7e00c7f1127cef8e97035e0 8593093e2b982ff4ad9bf23d65f47086 69504dd6849ffaee6121f288a79711a3 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad EAFIT |
repository.mail.fl_str_mv |
repositorio@eafit.edu.co |
_version_ |
1814110593675689984 |
spelling |
Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees2019-06-042019-11-22T16:03:59Z2019-06-042019-11-22T16:03:59Z2256-43141794-9165http://hdl.handle.net/10784/1437610.17230/ingciencia.15.29.4One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length. Indeed, increasing the number of bits that conforms the key used by a symmetric cryptography algorithm will increase its security level with a cost on its performance. Expanding a key in symmetric cryptography is not an easy task due to algorithms are designed to work with keys of a fixed maximum length. This paper presents an alternative design of the RC5 cryptography algorithm with an enhanced security level achieved through a key expansion mechanism with Parallel Computing processing. Although the design was created for the RC5 algorithm the main idea might be applied to other block cipher algorithms applying the same criteria. This methodology makes feasible to obtain a robust symmetric key algorithm implemented in software with an acceptable performance in comparison with other techniques such as implementations in hardware, reduction in the amount of data, improvements in the key exchange process, advanced high performance computing, and many others techniques.Una de las principales desventajas de los algoritmos de clave simétrica en comparación con los asimétricos es su menor nivel de seguridad debido a su longitud de clave más corta. Ciertamente, aumentar el número de bits que conforman la clave utilizada por un algoritmo de criptografía simétrica aumentará su nivel de seguridad con un costo en su rendimiento. Extender una clave en criptografía simétrica no es una tarea fácil ya que los algoritmos están diseñados para trabajar con claves de una longitud máxima fija. Este artículo presenta un diseño alternativo del algoritmo de criptografía RC5 con un nivel de seguridad mejorado que se logra a través de un mecanismo de expansión de clave con procesamiento de Computación Paralela. Aunque el diseño fue creado para el algoritmo RC5 la idea principal podría ser aplicada a otros algoritmos de cifrado en bloque aplicando el mismo criterio. Esta metodología hace factible obtener un algoritmo de clave simétrica robusto implementado sobre software con un rendimiento aceptable en comparación con otras técnicas como implementaciones sobre hardware, reducción en la cantidad de datos, mejoras en el proceso de intercambio de clave, computación avanzada de alto rendimiento, entre otras.application/pdfengUniversidad EAFIThttp://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474Copyright (c) 2019 David Fabián Cevallos SalasAcceso abiertohttp://purl.org/coar/access_right/c_abf2instname:Universidad EAFITreponame:Repositorio Institucional Universidad EAFITIngeniería y Ciencia; Vol 15, No 29 (2019)Enhanced RC5 Algorithm using Parallel Computing for Communication NetworksAlgoritmo RC5 mejorado usando computación paralela para redes de comunicaciónarticleinfo:eu-repo/semantics/articlepublishedVersioninfo:eu-repo/semantics/publishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1CryptographySymmetric KeyRc5AlgorithmPerformanceCriptografíaClave SimétricaRc5AlgoritmoRendimientoCevallos Salas, David FabiánUniversidad Tecnológica EquinoccialIngeniería y Ciencia1529103125ing.cienc.THUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/574d1c36-d18b-46e9-ac6e-0c76a1ce9732/downloadda9b21a5c7e00c7f1127cef8e97035e0MD51ORIGINALdocument (4).pdfdocument (4).pdfTexto completo PDFapplication/pdf1131502https://repository.eafit.edu.co/bitstreams/c5de9f13-68a8-43df-ac5b-b202303523a3/download8593093e2b982ff4ad9bf23d65f47086MD52articulo.htmlarticulo.htmlTexto completo HTMLtext/html374https://repository.eafit.edu.co/bitstreams/8f4af3a3-f546-4e02-87ef-c7de57b36ab4/download69504dd6849ffaee6121f288a79711a3MD5310784/14376oai:repository.eafit.edu.co:10784/143762020-09-02 13:37:40.907open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co |