Performance Analysis for RC6 and PRESENT Encryption Algorithms in Cloud Environment

Authors

  • Doaa S. Salman Imam Alkadhim College, Baghdad 10061, Iraq
  • Huda H. Ali Imam Alkadhim College, Baghdad 10087, Iraq

DOI:

https://doi.org/10.29304/jqcsm.2024.16.41775

Keywords:

NIST Compliance, Lightweight Algorithms, Cloud Environment, RC6 Algorithm, PRESENT Algorithm

Abstract

Organizations and individuals increasingly rely on cloud services for data storage and transmission, and the need for robust and efficient encryption algorithms is more critical than ever. This paper rigorously examines the performance and NIST compliance of two lightweight encryption algorithms, RC6 and PRESENT, within cloud computing contexts. The paper assesses the algorithms' performance metrics, such as encryption time, decryption time, space-time, memory used, CPU consumption, avalanche effect, entropy, and energy consumption, in addition to their security features. Also, utilizing fifteen NIST SP 800-22 cryptographic tests to ensure secure and efficient practices, including recent security analyses to assess the two algorithms' behavior, both algorithms present a distinct array of compromises between effectiveness and protection.

The results function as a strong regulator for the decision-making process in cloud security, offering advantages to both professionals in the field and experts in cryptography, it shows RC6 outperforms PRESENT in encryption (5.334s vs. 6.937s), decryption (6.035s vs. 6.191s), and space-time efficiency (1189 bytes/s vs. 41 bytes/s). While PRESENT uses less memory after encryption (41.27 MB vs. 67.63 MB), RC6 has slightly lower CPU consumption (4.50% vs. 4.90% for encryption) and higher energy efficiency (0.901J vs. 0.956J). Deep analysis is implemented to balance security and efficiency, and after implementing the two algorithms to encrypt the same file the result of the analysis was, that RC6 stands out as a particularly strong contender. It offers robust security features and is more efficient in terms of computational time, resource utilization, and energy consumption. PRESENT, while secure, tends to consume more resources and takes longer for encryption and decryption. However, its simpler design might offer some advantages in certain scenarios, though this comes with trade-offs in performance and resource efficiency.

Downloads

Download data is not yet available.

References

Kumar, J. & Saxena, V. Cloud Data Security Through Bb84 Protocol And Genetic Algorithm. Baghdad Science Journal 19, 1445–1453 (2022).

William Stallings. Cryptography And Network Security (Principles And Practice). (British Library Cataloguing-In-Publication Data, 2017).

Rokan, J., Naser, N. M. & Naif, J. R. New Ultra-Lightweight Iot Encryption Algorithm Using Novel Chaotic System International Journal On ‘Technical And Physical Problems Of Engineering’ Ijtpe Journal New Ultra-Lightweight Iot Encryption Algorithm Using Novel Chaotic System. Issue 53, 253–259 (2022).

Bassham, L. E. Et Al. A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications. Https://Nvlpubs.Nist.Gov/Nistpubs/Legacy/Sp/Nistspecialpublication800-22r1a.Pdf (2010) Doi:10.6028/Nist.Sp.800-22r1a.

Security and Privacy Controls for Information Systems and Organizations - NIST 800- 53 Rev.4. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf (2013) doi:10.6028/NIST.SP.800-53r5

Patil, P., Narayankar, P., Narayan, D. G. & Meena, S. M. A Comprehensive Evaluation Of Cryptographic Algorithms: Des, 3des, Aes, Rsa And Blowfish. In Procedia Computer Science Vol. 78 617–624 (Elsevier B.V., 2016).

Barker, E., Roginsky, A. & Davis, R. Recommendation For Cryptographic Key Generation. Https://Nvlpubs.Nist.Gov/Nistpubs/Specialpublications/Nist.Sp.800-133r2.Pdf (2020) Doi:10.6028/Nist.Sp.800-133r.

Podimatas, P. & Limniotis, K. Evaluating The Performance Of Lightweight Ciphers In Constrained Environments—The Case Of Saturnin. Signals 3, 86–94 (2022).

Herman, M. Nist Cloud Computing Forensic Reference Architecture. Https://Nvlpubs.Nist.Gov/Nistpubs/Specialpublications/Nist.Sp.800-201.Ipd.Pdf (2023) Doi:10.6028/Nist.Sp.800-201.Ipd.

D. S. Salman, J. R. Naif “Comparative Study Of Chaotic System For Encryption,” Iraqi Journal for Computers and Informatics, Vol. 49, Issue 2, 2023, doi: 10.25195/ijci.v49i2.457.

Mailewa, A. B. Et Al. Encryption Methods And Key Management Services For Secure Cloud Computing: A Review. Https://Www.Researchgate.Net/Publication/369777264.

Bogdanov, A. Et Al. (2007). Present: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, (Eds) Cryptographic Hardware And Embedded Systems - Ches 2007. Ches 2007. Lecture Notes In Computer Science, Vol 4727. Springer, Berlin, Heidelberg. Https://Doi.Org/10.1007/978-3-540-74735-2_31.

R. Fan, T. Cui, S. Chen, C. Jin, And H. Zheng, “Multiset Structural Attack On Generalized Feistel Networks,” Hindawi: Mathematical Problems In Engineering Journal, Vol. 2019, Doi: 10.1155/2019/2390462.

William Stallings. Cryptography And Network Security (Principles And Practice). (British Library Cataloguing-In-Publication Data, 2017).

About Nist. The National Institute Of Standards And Technology Https://Www.Nist.Gov/About-Nist (2022).

Andrew Rukhin Et. Al. "Nist 800- 22 Rev. 1a: A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications," Nist, Gaithersburg, Md 20899-8930, April 2010, Doi:10.6028/Nist.Sp.800-22r1a

N. Goswami, B. Cao, and T. Li “Power-performance Co-optimization of Throughput Core Architecture using Resistive Memory” IEEE Conference: 19th International Symposium on High Performance Computer Architecture (HPCA), Feb. 2013, doi: I: 10.1109/HPCA.2013.6522331.

Downloads

Published

2024-12-30

How to Cite

S. Salman, D., & H. Ali, H. (2024). Performance Analysis for RC6 and PRESENT Encryption Algorithms in Cloud Environment. Journal of Al-Qadisiyah for Computer Science and Mathematics, 16(4), Comp. 66–77. https://doi.org/10.29304/jqcsm.2024.16.41775

Issue

Section

Computer Articles