6 CONCLUSION AND FUTURE
WORK
In its essence, DCBC consists on running a chaining
layer on top of multiple CBC encryption operations
that run in parallel. This allows for a configurable
trade-off between performance and diffusion by ma-
nipulating the number of independent CBC encryp-
tion operations that we run, which is equivalent to
manipulating the Chunk Size, as each chunk will go
through its own CBC encryption.
For its security, DCBC inherits the same proper-
ties as CBC but requires an equally secure IV Gen-
erator to make sure the underlying CBC encryption
operations’ security will not be compromised. In this
article we offered a suggestion for such a function,
but it may be possible to find more examples that re-
spect the requirements we specified for a usable IV
Generator.
When it comes to performance, the calculated the-
oretical values show promising results compared to
using CBC, and the gap in performance seems to get
even more interesting for larger files. This re-enforces
the initial idea of adopting DCBC especially in Big
Data environments.
Currently, we are looking to validate these theoret-
ical findings with empiric experiments by implement-
ing DCBC and running it on multiple cores locally
and/or on multiple machines in a distributed system.
Running tests on a working DCBC implementation
would, also, allow us to compare the level of diffu-
sion and its randomness, when using DCBC and CBC
modes.
Later, we will study the effect of running DCBC
on a real Big Data system by implementing its logic
in a resource manager such as YARN (Vavilapalli and
al., 2013).
Finally, we will look into generalizing the idea
used to create DCBC, in order to give a more global
solution that offers this trade-off between parallel ex-
ecution and diffusion using any underlying mode of
operation and not just CBC.
REFERENCES
Bard, G. V. (2006). A challenging but feasible blockwise-
adaptive chosen-plaintext attack on SSL. SECRYPT
2006 - International Conference on Security and
Cryptography, Proceedings, pages 99–109.
Bellare, M., Desai, A., Jokipii, E., and Rogaway, P. (1997).
Concrete security treatment of symmetric encryption.
In Annual Symposium on Foundations of Computer
Science - Proceedings, pages 394–403.
Daemen, J. and Rijmen, V. (1999). AES proposal: Rijndael.
Desai, A., Ankalgi, K., Yamanur, H., and Navalgund, S. S.
(2013). Parallelization of AES algorithm for disk en-
cryption using CBC and ICBC modes. 2013 4th In-
ternational Conference on Computing, Communica-
tions and Networking Technologies, ICCCNT 2013,
(November 2001).
Dut¸
ˇ
a, C. L., Michiu, G., Stoica, S., and Gheorghe, L.
(2013). Accelerating encryption algorithms using par-
allelism. Proceedings - 19th International Conference
on Control Systems and Computer Science, CSCS
2013, pages 549–554.
Dworkin, M. (2005). Recommendation for Block Cipher
Modes of Operation. National Institute of Standards
and Technology Special Publication 800-38A 2001
ED, X(December):1–23.
Joux, A., Martinet, G., and Valette, F. (2002). Blockwise-
Adaptive Attackers Revisiting the (In)Security of
Some Provably Secure Encryption Modes: CBC,
GEM, IACBC. In Yung, M., editor, Advances in Cryp-
tology — CRYPTO 2002, pages 17–30, Berlin, Heidel-
berg. Springer Berlin Heidelberg.
Katos, V. (2005). A randomness test for block ciphers. Ap-
plied Mathematics and Computation, 162(1):29–35.
McGrew, D. a. (2002). Counter Mode Security : Analysis
and Recommendations. pages 1–8.
Phan, D. H. and Pointcheval, D. (2004). About the
security of ciphers (semantic security and pseudo-
random permutations). Lecture Notes in Computer
Science (including subseries Lecture Notes in Artifi-
cial Intelligence and Lecture Notes in Bioinformatics),
3357:182–197.
Pittalia, P. P. (2019). A Pros and Cons of Block Cipher
Modes for Symmetric Key Algorithms. 1(06):6–9.
Sahi, A., Lai, D., and Li, Y. (2018). An Efficient Hash
Based Parallel Block Cipher Mode of Operation. 2018
3rd International Conference on Computer and Com-
munication Systems, ICCCS 2018, (Iv):212–216.
Shetty, M. M. and Manjaiah, D. H. (2017). Data security in
Hadoop distributed file system. Proceedings of IEEE
International Conference on Emerging Technological
Trends in Computing, Communications and Electrical
Engineering, ICETT 2016, pages 10–14.
Stallings, W. (2010). NIST block cipher modes of operation
for confidentiality. Cryptologia, 34(2):163–175.
Vavilapalli, V. K. and al. (2013). Apache hadoop YARN:
Yet another resource negotiator. Proceedings of the
4th Annual Symposium on Cloud Computing, SoCC
2013.
Verdult, R. (2001). Introduction to Cryptanalysis: Attack-
ing Stream Ciphers. pages 1–22.
APPENDIX
We aim to calculate a theoretical approximation for
the cost of encrypting some plain text M that will
be divided into L chunks and encrypted using N
CPUs/Cores.
First, we will define C(i) as a combination of two
different expressions over two disjoint intervals:
DCBC: A Distributed High-performance Block-Cipher Mode of Operation
95