Page 101 - IJEEE-2023-Vol19-ISSUE-1
P. 101

Baban & Hameed                                                                                                                          | 97

implementation is done by using different sizes key128,192 and           Meanwhile, the performance evaluation of the AES is based also
256 bits, AES algorithms as shown in the figure 4 below:                 on the memory parameter and effect on Intel-Core i7-6600U
                                                                         Processor (8M Cache, up to 2.6 GHz) with RAM 64GB. The
     Fig.4: User Database Table of AES- HMAC-SHA256                      results in Figure 7 demonstrate that the AES-256 need moreMemory Usage (KB)
           Security System.                                              space of memory to encrypt the data.

B. Experimental Results                                                           300

   All experiments were done on a laptop hp Elitebook 2.6 GHz                     250
Intel processor with 16GB memory and 512GB hard disk. The
operating system which was used is 64bit Windows 10. The                          200
results were executed based on the database XAMPP
phpMYAdmin Server and the programming language is PHP,                            150
HTML, CSS, and JAVASCRIPT. Performance comparison of                                            2 4 8 16
symmetric encryption algorithm AES based on the execution
time of Encryption with different types of keys length 128,192                                             Data Length
and 256 bits and study is performed on the effect of changing
plaintext length 2,4,8 and 16 respectively on encryption time,                              AES-128 AES-192 AES-256
CPU workload and amount of the memory usage.                                                    Fig. 7: Reserved Memory (KB)

    Figure 5, shows the execution time in the encrypting                 As the entropy test, a famous measure of uncertainty in the
process for three types of AES keys over different lengths of
plaintext. The units of encryption time were measured in                 theory of knowledge was described in 1948 by (Shannon, 1948)
milliseconds. Overall, the consumption time of encryption
using AES-256 is higher than the rest of the AES types.                  [33]. Shannon proposed that entropy H(X) could be calculated

            100                                                          by the average amount of information of a discrete random

                                                                         variable X

                                                                                                               n                   (2)

                                                                                            åH ( X ) = P (xi )log2 P(xi )
                                                                                                              i =1

                                                                         on the following terms:

               Time (m sec)  50                                          X consists of a finite of a sample space x1, x2, x3,.., xn;
                                                                         P(xi) probability distribution, xi ³ X ;
                             0
                                       2                                                n

                                                                         å• And 1p(xi )
                                                                                        i

                                          48                         16  Entropy analysis measures the complexity of encrypted data
                                          Data length
                                                                         [34]. As the proposed security system consists of encrypted

                                                                         massage using AES combined with HMAC -256 that lead the

                       AES-128 AES-192 AES-256                           optimum entropy value is 5. 580.Thus, a value that is close to

         Fig. 5: Time consumption for encrypt different                  5.580 corresponds to the high complexity of encrypted data.
                length of text transmission (millisecond).
                                                                         Table II shows that combination of AES and HMAC algorithms
Results of the experiment for measuring the percent of CPU
used are presented in Figure 6. As one can see, the average              records the highest average entropy per byte in contrast if using
value is just above 7% when encrypted the message by the
AES-256 algorithm.                                                       only AES algorithm. increasing entropy leads to making the data

         8                                                               less susceptible to attack.

         6                                                                                            TABLE II

         4                                                                                  AVERAGE ENTROPY VALUES

         2                                                                Data              Average entropy     Average entropy per
                                                                         Length                  per byte                byte
         0
CPU usage (%)        2 4 8 16                                                                    Type of        Type of Algorithm /
                                   Data Length
                                                                                            Algorithm / AES     AES with HMAC

                                                                                            2 3.2743                       5.4321

                                                                                            4 3.6321                       5.4725

                                                                                            8 3.8439                       5.41665

                                 AES-128 AES-192 AES-256                                    16 4.1673                      5.5707

                                 Fig. 6: Percentage of CPU used (%)
   96   97   98   99   100   101   102   103   104   105   106