COMPARISON OF COMPRESSION ALGORITHMS AND HASH FUNCTIONS OF READY-MADE SOFTWARE SOLUTIONS IN THE CONTEXT OF CREATING YOUR OWN APPLICATION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.23.284309

Keywords:

1

Abstract

With the rapid development of information technology, working with electronic data
has become easy to implement and commonly used. As a result, most organizations have
eventually switched entirely to electronic data storage systems. However, the amount of
information is increasing exponentially every year, which requires the use of larger storage
facilities and resources to process it. In addition, the consumption of information in systems
creates increasing risks of data compromise. One of the ways to solve the described problems is to
use a software solution for data compression with integrity control by cryptographic hash
functions. The article analyzes the lossless data compression algorithms and hash functions used in
off-the-shelf software solutions, and additionally compares the hash functions with the State
Standard of Ukraine 7564:2014 Kupyna and analyzes the functionality of off-the-shelf solutions.
Based on the results of the study, the Deflate compression algorithm was chosen for practical
implementation. Compared to other options, the Kupyna hash function performs at the same level
or exceeds some indicators, which shows the quality of the algorithm. Most off-the-shelf software
solutions do not have a cryptographic function to check the integrity of information. The purpose
of this article is to build our own software application based on the study of all components. The
article proves that Deflate is better than the listed algorithms in the characteristics of compression
algorithms: memory size, performance, compression ratio, number of passes, whether redundancy
appears; the determining characteristic when comparing hash functions was the value of crypto-
resistance against one of the attacks (by collisions), where Kupyna has better characteristics and
has a high value of resistance; ready-made information compression programs were analyzed for
the algorithms they use, hash functions, and advantages with disadvantages. Comparative tables
with each component for the application and for the created software solutions are provided. Also
demonstrated are parts of the code implementation, the results of our own application of
information compression with integrity control. The effectiveness of our own tool is compared
with the analyzed software.

Downloads

Download data is not yet available.

References

Adaptive Huffman coding. (n.d.). courses.cs.washington.edu. https://courses.cs.washington.edu/courses/csep590a/07au/lectures/lecture02small.pdf.

Aumasson, J.-P., Neves, S., & Wilcox-O'Hearn, Z. (b.d.). Blake2. BLAKE2. https://www.blake2.net/blake2.pdf.

Bandizip (n.d.). Bandisoft - Bandizip, BandiView, Honeycam, Honeyview. https://uk.bandisoft.com/bandizip/.

Breezip is the best free file unzip and zip utility for Windows. (n.d.). Breezip is the best free file unzip and zip utility for Windows. https://www.breezip.com/.

Budrani, D. (2020, September 3). How the LZ78 compression algorithm works | hackernoon. HackerNoon - read, write and learn about any technology. https://hackernoon.com/how-lz78-compression-algorithm-works-x7103tlm.

Crochmore, M., and Lecroix, T. (b.d.). Text data compression algorithms. Researchgate.net. https://www.researchgate.net/publication/2243831_Text_Data_Compression_Algorithms.

Dheemanth, H. N. (b.d.). LZW data compression. AJER. https://www.ajer.org/papers/v3(2)/C0322226.pdf.

Dipperstein, M. (b.d.-a). Discussion and implementation of the Burroughs-Wheeler transform. Michael Dipperstein's GitHub site. https://michaeldipperstein.github.io/bwt.html.

Dipperstein, M. (b.d.-b). Discussion and implementation of LZSS (LZ77). Michael Dipperstein's GitHub site. https://michaeldipperstein.github.io/lzss.html.

Duarte, F. (2023, March 16). The amount of data created every day (2024). Exploding Topics. https://explodingtopics.com/blog/data-generated-per-day.

The Future of Data: Unstructured data statistics you need to know - congruity 360. Congruity 360. https://www.congruity360.com/blog/the-future-of-data-unstructured-data-statistics-you-should-know/.

Global Data Breaches and Cyberattacks. (n.d.). www.itgovernance.co.uk. https://www.itgovernance.co.uk/blog/global-data-breaches-and-cyber-attacks-in-january-2024-29530829012-records-breached

Gzip homepage. (n.d.). Gzip home page. https://www.gzip.org/.

Information Technology Laboratory. (2012). Secure Hashing Standard (SHS) (Federal Information Processing Standards Publication 180-4).

Laboratory of Information Technology. (2015). Fips 202 (SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions).

Kumar Yadav, A., & Prasad Panday, S. (b.d.). Post Burroughs-Wheeler transform with efficient clustering and interpolation coding. IOE graduate student conference. http://conference.ioe.edu.np/ioegc10/papers/ioegc-10-161-10211.pdf.

The most popular file compression and management utility. (n.d.). WinZip for Mac - Zip Files, Unzip Files. https://www.winzip.com/en/?alid=997335683.1717755843

PeaZip is a free archiver utility that opens RAR TAR ZIP archives. PeaZip is a file archiver utility, free RAR ZIP software. https://peazip.github.io/.

Pu, I. M. (2005). Fundamental data compression. Elsevier Science & Technology Books.

Sadeghi-Nasab, A., & Rafe, V. (2022). A comprehensive review of security flaws in hashing algorithms. Journal of Computer Virology and Hacking Technology. https://research.gold.ac.uk/id/eprint/33410/1/paper_en_v1.pdf.

Sayood, K. (2017). Introduction to data compression. Elsevier Science & Technology Books.

Stallings, W. (2006). The secure Whirlpool hash function. Cryptology, 30(1), 55-67. https://www2.seas.gwu.edu/~poorvi/Classes/CS381_2007/Whirlpool.pdf

Taylor, P. (n.d.). Data growth worldwide 2010-2025 | Statista. Statista. https://www.statista.com/statistics/871513/worldwide-data-created/.

Tutorial: Run-length encoding (RLE). (b.d.). filestore.aqa.org.uk. https://filestore.aqa.org.uk/resources/computing/AQA-8525-TG-RLE.PDF

What is data compression and what are its benefits. (b.d.). Barracuda Networks. https://www.barracuda.com/support/glossary/data-compression.

Glinchuk, L. Ya. (2014). Cryptology. Vezha-Druk.

Kovalenko, A. E. (2020). Theory of information and coding. Igor Sikorsky Kyiv Polytechnic Institute. Igor Sikorsky Kyiv Polytechnic Institute 2020.

Ministry of Economic Development of Ukraine (2015). Information technologies. Cryptographic protection of information. Hashing function (DSTU 7564: 2014).

Nechyporenko, O., & Korpan, Y. (2018). Data collection systems and their compact representation

Downloads


Abstract views: 49

Published

2024-03-28

How to Cite

Fesenko, A., & Hapon, R. (2024). COMPARISON OF COMPRESSION ALGORITHMS AND HASH FUNCTIONS OF READY-MADE SOFTWARE SOLUTIONS IN THE CONTEXT OF CREATING YOUR OWN APPLICATION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(23), 284–309. https://doi.org/10.28925/2663-4023.2024.23.284309