Enhanced RC5 Algorithm using Parallel Computing for Communication Networks

One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length. Indeed, increasing the number of bits that conforms the key used by a symmetric cryptography algorithm will increase its security level with...

Full description

Autores:
Cevallos Salas, David Fabián
Tipo de recurso:
Fecha de publicación:
2019
Institución:
Universidad EAFIT
Repositorio:
Repositorio EAFIT
Idioma:
eng
OAI Identifier:
oai:repository.eafit.edu.co:10784/14376
Acceso en línea:
http://hdl.handle.net/10784/14376
Palabra clave:
Cryptography
Symmetric Key
Rc5
Algorithm
Performance
Criptografía
Clave Simétrica
Rc5
Algoritmo
Rendimiento
Rights
License
Copyright (c) 2019 David Fabián Cevallos Salas
id REPOEAFIT2_1e3ec776197a01e205298069a0513727
oai_identifier_str oai:repository.eafit.edu.co:10784/14376
network_acronym_str REPOEAFIT2
network_name_str Repositorio EAFIT
repository_id_str
dc.title.eng.fl_str_mv Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
dc.title.spa.fl_str_mv Algoritmo RC5 mejorado usando computación paralela para redes de comunicación
title Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
spellingShingle Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
Cryptography
Symmetric Key
Rc5
Algorithm
Performance
Criptografía
Clave Simétrica
Rc5
Algoritmo
Rendimiento
title_short Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
title_full Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
title_fullStr Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
title_full_unstemmed Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
title_sort Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
dc.creator.fl_str_mv Cevallos Salas, David Fabián
dc.contributor.author.spa.fl_str_mv Cevallos Salas, David Fabián
dc.contributor.affiliation.spa.fl_str_mv Universidad Tecnológica Equinoccial
dc.subject.keyword.eng.fl_str_mv Cryptography
Symmetric Key
Rc5
Algorithm
Performance
topic Cryptography
Symmetric Key
Rc5
Algorithm
Performance
Criptografía
Clave Simétrica
Rc5
Algoritmo
Rendimiento
dc.subject.keyword.spa.fl_str_mv Criptografía
Clave Simétrica
Rc5
Algoritmo
Rendimiento
description One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length. Indeed, increasing the number of bits that conforms the key used by a symmetric cryptography algorithm will increase its security level with a cost on its performance. Expanding a key in symmetric cryptography is not an easy task due to algorithms are designed to work with keys of a fixed maximum length. This paper presents an alternative design of the RC5 cryptography algorithm with an enhanced security level achieved through a key expansion mechanism with Parallel Computing processing. Although the design was created for the RC5 algorithm the main idea might be applied to other block cipher algorithms applying the same criteria. This methodology makes feasible to obtain a robust symmetric key algorithm implemented in software with an acceptable performance in comparison with other techniques such as implementations in hardware, reduction in the amount of data, improvements in the key exchange process, advanced high performance computing, and many others techniques.
publishDate 2019
dc.date.available.none.fl_str_mv 2019-11-22T16:03:59Z
dc.date.issued.none.fl_str_mv 2019-06-04
dc.date.accessioned.none.fl_str_mv 2019-11-22T16:03:59Z
dc.date.none.fl_str_mv 2019-06-04
dc.type.eng.fl_str_mv article
info:eu-repo/semantics/article
publishedVersion
info:eu-repo/semantics/publishedVersion
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.local.spa.fl_str_mv Artículo
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 2256-4314
1794-9165
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10784/14376
dc.identifier.doi.none.fl_str_mv 10.17230/ingciencia.15.29.4
identifier_str_mv 2256-4314
1794-9165
10.17230/ingciencia.15.29.4
url http://hdl.handle.net/10784/14376
dc.language.iso.eng.fl_str_mv eng
language eng
dc.relation.isversionof.none.fl_str_mv http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474
dc.relation.uri.none.fl_str_mv http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474
dc.rights.eng.fl_str_mv Copyright (c) 2019 David Fabián Cevallos Salas
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.local.spa.fl_str_mv Acceso abierto
rights_invalid_str_mv Copyright (c) 2019 David Fabián Cevallos Salas
Acceso abierto
http://purl.org/coar/access_right/c_abf2
dc.format.none.fl_str_mv application/pdf
dc.coverage.spatial.eng.fl_str_mv Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees
dc.publisher.spa.fl_str_mv Universidad EAFIT
dc.source.none.fl_str_mv instname:Universidad EAFIT
reponame:Repositorio Institucional Universidad EAFIT
dc.source.spa.fl_str_mv Ingeniería y Ciencia; Vol 15, No 29 (2019)
instname_str Universidad EAFIT
institution Universidad EAFIT
reponame_str Repositorio Institucional Universidad EAFIT
collection Repositorio Institucional Universidad EAFIT
bitstream.url.fl_str_mv https://repository.eafit.edu.co/bitstreams/574d1c36-d18b-46e9-ac6e-0c76a1ce9732/download
https://repository.eafit.edu.co/bitstreams/c5de9f13-68a8-43df-ac5b-b202303523a3/download
https://repository.eafit.edu.co/bitstreams/8f4af3a3-f546-4e02-87ef-c7de57b36ab4/download
bitstream.checksum.fl_str_mv da9b21a5c7e00c7f1127cef8e97035e0
8593093e2b982ff4ad9bf23d65f47086
69504dd6849ffaee6121f288a79711a3
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad EAFIT
repository.mail.fl_str_mv repositorio@eafit.edu.co
_version_ 1814110593675689984
spelling Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees2019-06-042019-11-22T16:03:59Z2019-06-042019-11-22T16:03:59Z2256-43141794-9165http://hdl.handle.net/10784/1437610.17230/ingciencia.15.29.4One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length. Indeed, increasing the number of bits that conforms the key used by a symmetric cryptography algorithm will increase its security level with a cost on its performance. Expanding a key in symmetric cryptography is not an easy task due to algorithms are designed to work with keys of a fixed maximum length. This paper presents an alternative design of the RC5 cryptography algorithm with an enhanced security level achieved through a key expansion mechanism with Parallel Computing processing. Although the design was created for the RC5 algorithm the main idea might be applied to other block cipher algorithms applying the same criteria. This methodology makes feasible to obtain a robust symmetric key algorithm implemented in software with an acceptable performance in comparison with other techniques such as implementations in hardware, reduction in the amount of data, improvements in the key exchange process, advanced high performance computing, and many others techniques.Una de las principales desventajas de los algoritmos de clave simétrica en comparación con los asimétricos es su menor nivel de seguridad debido a su longitud de clave más corta. Ciertamente, aumentar el número de bits que conforman la clave utilizada por un algoritmo de criptografía simétrica aumentará su nivel de seguridad con un costo en su rendimiento. Extender una clave en criptografía simétrica no es una tarea fácil ya que los algoritmos están diseñados para trabajar con claves de una longitud máxima fija. Este artículo presenta un diseño alternativo del algoritmo de criptografía RC5 con un nivel de seguridad mejorado que se logra a través de un mecanismo de expansión de clave con procesamiento de Computación Paralela. Aunque el diseño fue creado para el algoritmo RC5 la idea principal podría ser aplicada a otros algoritmos de cifrado en bloque aplicando el mismo criterio. Esta metodología hace factible obtener un algoritmo de clave simétrica robusto implementado sobre software con un rendimiento aceptable en comparación con otras técnicas como implementaciones sobre hardware, reducción en la cantidad de datos, mejoras en el proceso de intercambio de clave, computación avanzada de alto rendimiento, entre otras.application/pdfengUniversidad EAFIThttp://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/5474Copyright (c) 2019 David Fabián Cevallos SalasAcceso abiertohttp://purl.org/coar/access_right/c_abf2instname:Universidad EAFITreponame:Repositorio Institucional Universidad EAFITIngeniería y Ciencia; Vol 15, No 29 (2019)Enhanced RC5 Algorithm using Parallel Computing for Communication NetworksAlgoritmo RC5 mejorado usando computación paralela para redes de comunicaciónarticleinfo:eu-repo/semantics/articlepublishedVersioninfo:eu-repo/semantics/publishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1CryptographySymmetric KeyRc5AlgorithmPerformanceCriptografíaClave SimétricaRc5AlgoritmoRendimientoCevallos Salas, David FabiánUniversidad Tecnológica EquinoccialIngeniería y Ciencia1529103125ing.cienc.THUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/574d1c36-d18b-46e9-ac6e-0c76a1ce9732/downloadda9b21a5c7e00c7f1127cef8e97035e0MD51ORIGINALdocument (4).pdfdocument (4).pdfTexto completo PDFapplication/pdf1131502https://repository.eafit.edu.co/bitstreams/c5de9f13-68a8-43df-ac5b-b202303523a3/download8593093e2b982ff4ad9bf23d65f47086MD52articulo.htmlarticulo.htmlTexto completo HTMLtext/html374https://repository.eafit.edu.co/bitstreams/8f4af3a3-f546-4e02-87ef-c7de57b36ab4/download69504dd6849ffaee6121f288a79711a3MD5310784/14376oai:repository.eafit.edu.co:10784/143762020-09-02 13:37:40.907open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co