Performance Evaluation of Non-Latin Characters Based (Arabic) Symmetric Encryption Algorithm
Performance Evaluation of Non-Latin Characters Based (Arabic) Symmetric Encryption Algorithm
ISSN No:-2456-2165
Abstract:- Cryptography is the art of keeping uses a single key for encryption and decryption. The
information secure by transforming it into form that Symmetric encryption techniques provide cost-effective and
unintended recipients cannot understand. Encryption is efficient methods of securing data without compromising
a form of data security in which information is converted security however; sharing the secret key is a problem. On
to cipher text to ensure confidentiality, authentication the other hand, asymmetric techniques solve the problem of
and integrity of user data. Issue relating to the choice of distributing the key for encryption, but; they are slow
encryption algorithm among the Arabian IT community compared to symmetric encryption and consume more
is another challenge. This research evaluated the computer resources.
performance of three symmetric non-Latin character-
based encryption algorithms for Arabic text: First- In networking, security depends solely on
Order-Equation-of-Three-Variables, Modulo-37-cipher, cryptography (meaning “secret writing”), which is the
and Atbash-Substitution. The algorithms were assessed science and art of transforming messages to make them safe
based on the following performance metrics namely: and immune to attack (Hamouda, 2020).Cryptography is
encryption time, decryption time, execution time, said to be an Arab-born science that is improved by western
throughput, memory usage, and avalanche effect. The scientists (Al-Omari, 2018). A great historian in cryptology,
results revealed that the Atbash-Substitution algorithm David Khan stated that “cryptology was born in Arabic
had the highest throughput at 35.63 B/ms and the lowest world”and the fact was later confirmed in some Arabic
memory usage at 197.90 MB. It also exhibited a weak treatise found in Istanbul’s Suleymanye library in addition to
avalanche effect. In contrast, the Modulo-37-cipher the work of other scholars who wrote about cryptography
algorithm showed poor performance in terms of and cryptanalysis in the Arab world (Al-Omari, 2018).
throughput. Therefore, the Atbash-Substitution
algorithm demonstrated superior performance for Data that can be perused and perceived with no
Arabic text, being the fastest and most memory-efficient difficulty or special measures is called plain text. The
among the evaluated algorithms. method of changing plaintext and making it meaningless is
called encryption. The encryption process produces
Keyword:- Cipher, non-latin, throughput, encryption, unreadable and meaningless output called cipher-text. The
algorithms, modulo-37-cipher. process of retrieving plain text from cipher text is known as
decryption (Kuppuswamy and Alqahtani, 2014).
I. INTRODUCTION
Therefore, this paper aimed at comparing the three
As the Internet and other forms of electronic aforementioned algorithms which were evaluated based on
communication become more prevalent in the non-Latin the encryption and decryption time, throughput, memory
speaking countries/ groups, electronic security is becoming used and avalanche effects.
increasingly important (Al-Omari,2018). Thus, it becomes
essential to protect e-mail messages, credit card information, II. ALGORITHMS UNDER EVALUATION
and corporate data, by means of encryption that conform
with the Latin alphabets and numbers.Various cryptographic Modulo 37 Cipher Encryption Algorithm:
algorithms have been proposed and implemented to achieve Kuppuswamy and Alqahtani, (2014) developed an
the security requirements such as Authentication, encryption algorithm cipher that uses modulo 37 in its
Confidentiality, and Integrity of the Arabic language. There mathematical model. The algorithm provided an effective
are basically two types of encryption techniques; symmetric use of key algorithm on Arabic characters.
and asymmetric. Symmetric cryptography is the one which
The algorithm process for the decryption phase is Step 2 – calculation was done using modulo 37
as follows; Step 3 – Result of the calculation produce ‘R’
Step 1 – encrypted text was multiplied by key1 and
key2
Fig. 1: Modulo 37 Cipher Encryption and Decryption Architecture (Kuppuswamy and Alqahtani, 2014)
First Order Equation of Three variables Encryption generate key. The algorithm technique makes use of
Algorithm: Shaban (2017) in his work proposed the different equation in the key generation mechanism and
algorithm where two random numbers are used to encryption mechanism.
Step 3 – the XOR of key1 and the odd position characters is computed; same as the XOR of key2 and the character in the
even position computed
Step 5 – All messages are later converted to the binary format transmitted to the receiver over the internet
Fig. 2: First Order Equation of Three variables Encryption Phase (Basim, 2017)
Fig. 3: First Order Equation of Three variables Decryption Phase (Basim, 2016)
For clarification, simplicity and a better understanding The model would be able to perform encryption and
of the application,figure 4 shows the modules involved the decryption of non-Latin character based (Arabic). It is
evaluation processes. assumed the computer system involved in the model runs
The first module (data module), specified the data to be Microsoft Windows operating system because this is a
encrypted or decrypted using different algorithms. The platform where the developed system will perform
data accepted by this module is the Arabic text. optimally.The evaluation system was developed using PHP
The second module (algorithm module), involved the because it is a general-purpose language endowed with
selection of any of the implemented algorithm to be used numerous implementations. The choice of the language is
for encryption and decryption of the data specified in the made due to its excellent flexibility, combinability and the
data module. availability of specialist writing the language.
The third module (report module), displayed the
resulting report of encryption and decryption process VI. RESULT AND DISCUSSION
based on the selected performance metrics. The report From the data recorded for ten (10) different Arabic
will include result of the encryption, the data size, the texts that are of different size, the evaluation of the
encryption parameters, and memory usage. All these following metrics was deduced and represented with tables
parameters will be displayed for each algorithm that was and charts.
executed independently of the others (i.e. every
Encryption Time: As shown in table 1 and represented
algorithm will be executed one after the other so that
in figure 5, On average, Atbash substitution has
each can have full system resources at its disposal). The
12.66ms, Modulo-37-cipher 19.07ms while first order
result of this module is the key to determining the most
equation of three variables 21.79ms. Also, the encryption
secure and appropriate encryption algorithm for each
time increases with increase in the input data size.
data type, size and scenario.
Encryption time is directly proportional to the input data
size.
Decryption Time: As shown in table 2 and illustrated in substitution has 12.66ms. Also, the decryption time
figure 6,modulo-37-cipher has 12.79ms, first order increases with increase in the input data size. Encryption
equation of three variables 13.01ms and Atbash time is directly proportional to the input data size.
Execution Time (𝑬𝑿𝒕 ): As shown in table 3 and Atbash substitution 33.82ms and first order equation of
illustrated in figure 7, modulo-37-cipher has 31.86ms, three variables 34.89ms.
Throughput (𝑻𝒑 ):Table 4 and figure 8 shows the has 35.63b/ms, modulo-37-cipher 23.83b/ms, and first
throughput for the selected encryption algorithm for non- order equation of three variables 21.19b/ms.
Latin character (Arabic), on average, Atbash substitution
Memory Used: As shown in Table 5 and represented cipher 196.31 MB, and first order equation of three
with the chart in the figure 9, on average, it was deduced variables 197.04 MB.
that Atbash Substitution used 197.04 MB, modulo-37-
Avalanche Effect: This explains the diffusion reflects of uses low memory space. First Order Equation of Three
the cryptographic strength of each encryption algorithm. variables showed poor performance results compared to
It provides the significant changes made to an input other algorithms since it requires more memory and has
(plain text) to produce an output (cipher text). As shown poor throughput.
in the decryption GUI of each of the encryption
algorithm, it is deduced that Atbash substitution has REFERENCES
weak avalanche effect in that the number of bits of the
[1]. Ahmad, S., Alam, K. M. R., Rahman, H., and Tamura,
input plain text produce the same number of bits of the
S. (2015, January). A comparison between symmetric
output cipher text while others have strong avalanche
and asymmetric key encryption algorithm based
effect.
decryption mixnets. International Conference on
VII. CONCLUSION Networking Systems and Security (NSysS) (pp. 1-5).
IEEE.
Cryptography is the art of keeping information secure [2]. Al-Omari, A. H. (2018). ABJAD Arabic-Based
by transforming it into form that unintended recipients Encryption. International Journal of Advanced
cannot understand. Encryption is a form of data security in Computer Science and Applications, 9(10).
which information is converted to cipher text to ensure [3]. Altamimi, A. S. H., &Kaittan, A. M. (2021). A
confidentiality, authentication, integrity, availability and Proposed Arabic Text Encryption Method Using
identification of user data. Issues relating to the choice of Multiple Ciphers. Management.
encryption algorithm take into consideration the block size, [4]. Elminaam, D. S. A., Kader, H. M. A., &Hadhoud, M.
CPU resources usage and time for encryption/decryption M. (2008). Performance evaluation of symmetric
process are another challenge in the IT community among encryption algorithms. IJCSNS International Journal
the Arabian text users. Hence, this research was a of Computer Science and Network Security, 8(12), 280-
performance evaluation of non-Latin character-based 286.
encryption algorithm. [5]. Hamouda, B. E. H. H. (2020). Comparative study of
different cryptographic algorithms. Journal of
The result obtained by the application is exported to Information Security, 11(3), 138-148.
Microsoft excel for further analysis. The result support that [6]. Kuppuswamy, P., &Alqahtani, Y. (2014). New
the throughput of any encryption algorithm is inversely innovation of Arabic language encryption technique
proportional to the period of the encryption process. In terms using new symmetric key algorithm. International
of throughput, Atbash substitution is the fastest, followed by Journal of Advances in Engineering & Technology,
First Order Equation of Three Variables and Modulo 37 7(1), 30.
Cipher. The encryption time is low in Atbash, followed by [7]. Masram, R., Shahare, V., Abraham, J., &Moona, R.
Modulo 37 Cipher and First Order Equation of Three (2014). Analysis and comparison of symmetric key
Variables. On memory usage, Atbash substitution required cryptographic algorithms based on various file
the least memory followed by Modulo 37 Cipher and First features. International Journal of Network Security &
Order Equation of Three Variables. Lastly, the avalanche Its Applications, 6(4), 43.
effect is strong in Modulo 37 Cipher and First Order [8]. Shaban, S. A. (2017). A new algorithm for encrypting
Equation of Three Variables while weak in Atbash Arabic text using the mathematical equation. Diyala
substitution. journal of engineering sciences, 10(1), 21-30.
[9]. Stallings, W. (2006). Cryptography and network
It was concluded that Atbash substitution has a better security principles and practices 4th edition.
performance for Arabic text than the other two algorithms
compared since it is the fastest in terms of throughput and