IMPLEMENTATION OF THE SYMMETRIC CRYPTOGRAPHIC ALGORITHMS RC2 AND TRIPLE DES IN ECB MODE USING CRYPTOGRAPHIC SOFTWARE PROGRAM CRYPTOOL

IMPLEMENTATION OF THE SYMMETRIC CRYPTOGRAPHIC ALGORITHMS RC2 AND TRIPLE DES IN ECB MODE USING CRYPTOGRAPHIC SOFTWARE PROGRAM CRYPTOOL

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v26i1.395

Keywords:

Algorithms, Cryptology, CrypTool, Decryption, Encryption, Hex, Integrity, Crack, Method, Privacy, Security, RC2, Triple DES

Abstract

This paper presents an in-depth analysis of symmetric key cryptographic algorithms, focusing on RC2 and Triple DES (ECB) as implemented in CrypTool. It is widely used educational software that demonstrates various cryptographic algorithms and methods. This paper aims to provide a foundational understanding of CrypTool, explain the functionalities of RC2 and Triple DES in Electronic Codebook (ECB) mode and evaluate their performance and security.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria, e-mail: petar.boyanov@shu.bg

References

Balasubramanian, K. (2021). Experiments with the Cryptool Software. In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government (pp. 424-432). IGI Global.

Bedzhev, B., Trıfonov, T., & Nıkolov, N. (2010). A multicore computer system for design of stream ciphers based on random feedback shift registers. İstanbul Aydın Üniversitesi Dergisi, Turkey, 2(7), 1-15., https://dergipark.org.tr/en/download/article-file/319309. [Last accessed on 25 September 2024]

Biryukov, A., De Cannière, C.: Data Encryption Standard (DES). In: van Tilborg H.C.A., Jajodia S. (eds.) Encyclopedia of Cryptography and Security, p. 296. Springer, Boston, MA (2011)

Boyanov, P., Using modified sniffer scripts, implementing linear algorithms for detection of network port scan attacks in Linux based operating systems. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 24, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 78-88, DOI: https://doi.org/10.46687/jsar.v24i1.371.

Boyanov, P., Investigating the network traffic using the command-line packets sniffer Tcpdump in Kali Linux. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 25, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 31-44, DOI: https://doi.org/10.46687/jsar.v25i1.378.

Esslinger, B. (2008). CrypTool. Available via www.cryptool.de. [Last accessed on 19 September 2024]

Esslinger, B. (2024). Learning and Experiencing Cryptography with CrypTool and SageMath. Artech House, ISBN: 978-1-68569-017-5.

El-Morshedy, D. S., El-Attar, N. E., Hanafy, I. M., & Awad, W. A. (2023). Cryptographic Algorithms for Enhancing Security in Cloud Computing. Alfarama Journal of Basic & Applied Sciences, 4(3), 433-455.

Garg, A., Sharma, K. K., & Chauhan, S. Performance Analysis of Password-Based AES Encryption and Decryption Using Cryptool.

Gueorguiev N.L., Nesterov K.N., Minev S., An approach to information exchange management in multimodule multi-position security systems. International Scientific Journal "Security & Future", Vol. 6, Issue 1, pp: 28-31, STUME, 2022, WEB ISSN 2535-082X; PRINT ISSN 2535-0668.

Hick, S., Esslinger, B., & Wacker, A. (2012). Reducing the complexity of understanding cryptology using CrypTool. In 10th International Conference on Education and Information Systems, Technologies and Applications (EISTA 2012), Orlando, Florida, USA.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, ISBN 978-3-030-65721-5, Springer 2020, pp.13-24,https://doi.org/10.1007/

-3-030-65722-2.

Iliev, R., Kochankov, M., A Generalized Net Model of Command and Control System. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 127-131, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8035.

Ivanov, I., & Aleksandrova, K. (2024, June). Design and Implementation of Software-Defined Doppler Radar. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume III, pp. 105-108, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol3.8159

Jüttner, A. C. Analysis of the Functionality, Risks and Counter-Measures of Current Padding Attacks and the Implementation of an Attack in the Open-Source Program CrypTool 2.

Kochankov, M., & Iliev, R. (2024, June). A Generalized Net Model for Accessing Information Resources in a Secure Environment. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 175-178, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/

etr2024vol2.8034.

Kolev, Alexander, Nikolova, Pavlina. Instrumental Equipment for Cyberattack Prevention. Information & Security: An International Journal 47, no. 3 (2020):285-299. https://doi.org/10.11610/isij.4720.

Kopal, N. (2018, June). Solving Classical Ciphers with CrypTool 2. In HistoCrypt (pp. 149-010).

Kopal, N., & Esslinger, B. (2022, June). New Ciphers and Cryptanalysis Components in CrypTool 2. In International Conference on Historical Cryptology (pp. 127-136).

Kulshreshtha, S., Verma, V., & Kalra, R. (2011). Analytical View of Cryptographic Techniques through Cryptool. Journal of Telecommunications, 10(2), 22-26.

Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Rupp, A., Schimmler, M.: How to Break DES for BC 8,980. In: SHARCS‘06–Special-purpose Hardware for Attacking Cryptographic Systems, pp. 17–35 (2006)

Lewis, B., Broadbent, M., Rotsos, C. et al. 4MIDable: Flexible Network Offloading For Security VNFs. J Netw Syst Manage 31, 52 (2023). https://doi.org/10.1007/s10922-023-09744-1.

Maeref, M., & Algali, F. (2015, January). An empirical evaluation of Cryptool in teaching computer security. In Proceedings of the International Conference on Computer Science, Engineering and Applications (pp. 93-100).

Manankova, O., & Yakubova, M. (2023, July). Modeling of the Modes of Operation of the AES Algorithm in the Cryptool 2 Environment. In Science and Information Conference (pp. 462-469). Cham: Springer Nature Switzerland.

Manjula, R., & Anitha, R. (2011). Identification of encryption algorithm using decision tree. In Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III 1 (pp. 237-246). Springer Berlin Heidelberg.

Meça, A. (2023, August). Exploring Data Encryption Standard (DES) Through CrypTool Implementation: A Comprehensive Examination and Historical Perspective. In International Conference for Emerging Technologies in Computing (pp. 143-160). Cham: Springer Nature Switzerland.

Mehreen, M. Usability Analysis of CrypTool-Online and CrypTool 2.

Mirtcheva-Ivanova, Daniela, Application of electronic platforms to increase the knowledge of learners. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 448-452, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8090.

Mirtcheva-Ivanova, D., Application of Artificial Intelligence in E-Learning. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 208-211, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8053.

Modi, B., & Gupta, V. (2016). Cryptography with High Throughput: A survey. International journal of innovative research in technology, 2(10), 2349-6002.

Noura, M., Noura, H., Chehab, A., Mansour, M., Couturier, R.: S-DES: An efficient & secure DES variant. In: IEEE Middle East and North Africa Communications Conference (MENACOMM) (2018).

Nurdin, A. A., & Djuniadi, D. (2022). Securing audio chat with cryptool-based twofish algorithm. Journal of Soft Computing Exploration, 3(1), 37-43.

Onete, C. (2008). Visualisation of Modern Key Exchange Schemes for more than two Parties in CrypTool and their Security Analysis.

Pavlov, G., Kolev. Al., A place of GIS technologies in information Systems for crisis prevention, 6th International Conference on Application of Information and Communication Technology and Statistics In Economy and Education (ICAICTSEE – 2016), December 2-3rd, 2016, UNWE, Sofia, Bulgaria, ISSN 2367-7635 (print), ISSN 2367-7643 (online), pp. 452-457.

Qureshi, M. A., Ahmed, S., Mehmood, A., Shaheen, R., & Dildar, M. S. (2024). Vulnerability assessment of operating systems in healthcare: exploitation implications techniques and security. Health Sciences Journal, 2(2), 104-111, ISSN (Online): 2959-2259, ISSN (Print): 2959-2240, https://doi.org/10.59365/hsj.2(2).2024.98.

Salmi, G. N., & Siagian, F. (2022). Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2. Journal of Soft Computing Exploration, 3(2), 99-104.

Sharma, N. A., & Farik, M. (2017). A performance test on symmetric encryption algorithms-RC2 Vs rijndael. International Journal of Scientific & Technology Research, 6(7), 292-294.

Simion, E., & Pătrașcu, A. (2020). Applied cryptography and practical scenarios for cyber security defense. Polytech. Univ. Bucharest, Bucharest, Romania, Tech. Rep, 11.

Tiawan, T., Fajari, M. S., Sihombing, R., Syastra, M. T., Novarini, R., Harahap, A. K., ... & Wijayanti, E. K. (2024). Analisis Penggunaan Wsl, VMware, Dan Virtual Box Di Atas Sistem Operasi Windows. Sentinel, 5(1), 409-420, ISSN (print): 2622-1462, doi: 10.56622/sentinel

journal.v5i1.39.

Trifonov T., 2019, Modeling and Calculation of Passive Audio Crossovers, Annual of Konstantin Preslavsky University of Shumen, Vol IX E Technical Sciences, ISSN 1311-834X, pp. 182-189.

Trifonov, T., Performance analysis of a mobile computer equipped with solid state disk. Annual of Konstantin Preslavsky University of Shumen, Shumen, Konstantin Preslavsky University Press, ISSN 1311-834X, Vol. IV E, 2014, pp. 27–42.

Weerasinghe, T. D. B. (2014). A Tool to Evaluate Symmetric Key Algorithms. International Journal of Information and Network Security, 3(1), 26.

Winograd, T. CrypTool Number Field Sieve Extensions. Copyright of Baltic Journal of Modern Computing is the property of University of Latvia and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.

Wölk, C. M. (2022). Methods To Ensure Privacy Regarding Medical Data--Including an examination of the differential privacy algorithm RAPPOR and its implementation in "Cryptool 2". arXiv preprint arXiv:2210.09963.

Downloads

Published

12.11.2024

How to Cite

Boyanov, P. (2024). IMPLEMENTATION OF THE SYMMETRIC CRYPTOGRAPHIC ALGORITHMS RC2 AND TRIPLE DES IN ECB MODE USING CRYPTOGRAPHIC SOFTWARE PROGRAM CRYPTOOL: IMPLEMENTATION OF THE SYMMETRIC CRYPTOGRAPHIC ALGORITHMS RC2 AND TRIPLE DES IN ECB MODE USING CRYPTOGRAPHIC SOFTWARE PROGRAM CRYPTOOL. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 26(1), 67–83. https://doi.org/10.46687/jsar.v26i1.395

Issue

Section

Communication and computer technologies

Categories

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 > >>