000 02531nam a22002417a 4500
003 FT8878
005 20251215163214.0
008 251215b ||||| |||| 00| 0 eng d
041 _aengtag
050 _aQA76.9 N38 A44 2025
082 _a.
100 1 _a Barroga, Sean Klarenz R.; Cristoles, Mark Daniel T.
245 _aEnhancement of chacha20 algorithm applied resource constrained devices
264 1 _a.
_b.
_cc2025
300 _bUndergraduate Thesis: (Bachelor of Science in Computer Science) - Pamantasan ng Lungsod ng Maynila, 2025
336 _2text
_atext
_btext
337 _2unmediated
_aunmediated
_bunmediated
338 _2 volume
_a volume
_b volume
505 _aABSTRACT: This study proposes an enhanced version of the ChaCha20 algorithm by integrating three primary modifications: the use of Tent Maps to introduce non-linear transformations that increase ciphertext unpredictability, randomized rotation contestants to improve diffusion and disrupt pattern information, and Elliptic Curve Diffie-Hellman (ECDH) combined with a HMAC-based Key Derivation Function (HKDF) to ensure secure and flexible key generation. These enhancements collectively address the limitations of the original ChaCha20 in terms of avalanche effect, diffusion strength, and key reuse vulnerability to achieving improved avalanche percentages, reduced execution times, and higher entropy in key generation when tested in a simulated ARM-based resource-constrained environment. The enhanced algorithm was evaluated on an ARM-based processor with 512MB RAM and a single vCPU, simulating a typical resource-constrained environment. Experimental results showed improved avalanche effect percentage with 52.27% for short plaintexts and 52.34% for medium plaintexts compared to 48.86%, and 51.56% in the original ChaCha20. Additionally, performance metrics demonstrated faster execution times, averaging 8.63ms for 1MB data and 42.09ms for 5MB data, surpassing the original’s 8.78ms and 44.39ms, respectively. These results confirm that the enhanced ChaCha20 algorithm offers better diffusion and efficiency without sacrificing lightweight characteristics, thereby making it more robust against cryptanalytic attacks. This study contributes to a practical advancement in the development of lightweight encryption tailored for modern low-power computing environments, providing valuable insights for future cryptographic designs in security-critical applications.
526 _aF
655 _aacademic writing
942 _2lcc
_cMS
999 _c37349
_d37349