Proceedings of International Conference on Applied Innovation in IT
2025/06/27, Volume 13, Issue 2, pp.17-24

Secure Data Management Via Lightweight Cryptographic Frameworks: A Comparative Study of ChaCha20 for Encryption and SHA-256 for Hashing Secure Using a Big Data


Azhar Sadiq Jafer and Huda Najeh Abbood


Abstract: With the advent of large-scale data applications, the security and efficiency of cryptographic systems have become two critical concerns. In this paper we present a cryptographic solution that combines the ChaCha20 encryption algorithm and SHA-256 hashing to provide data confidentiality and integrity. The system works on data in chunks to optimize for memory usage and scaling from 10 MB to 1 GB datasets. While achieving low resource utilization (CPU usage < 12% and a memory footprint < 50 MB) the proposed technique achieves cipher and decipher rates up to 88 MB/s with significant performance gain. SHA-256 based integrity verification achieved 100% accuracy, preventing tampering and corruption. The comparison with conventional systems (e.g., AES, MD5) reflected the superiority of the proposed system in various factors (i.e., speed, resource efficiency, and robustness). The system also proved capable of supporting large datasets through scalability testing, enabling uses in cloud storage, IoT security, and secure communications. These findings highlight the proposed system's ability as a lightweight and scalable cryptographic solution to meet the data security demands of the advanced digital era. With the rise of IoT and cloud computing, traditional encryption like AES struggles with high memory usage in resource-constrained devices. This paper proposes a lightweight framework combining ChaCha20 (for encryption) and SHA-256 (for integrity), optimized for big data. Our chunk-based approach achieves 88 MB/s throughput with <12% CPU usage, outperforming AES in software environments. Experimental results on datasets up to 1GB demonstrate 100% tamper detection accuracy, making it ideal for IoT and real-time applications.

Keywords: ChaCha20, Encryption, Decryption, Security, Big Data, SHA256.

DOI: 10.25673/120390

Download: PDF

References:

  1. R.G., S. Kumar, and A. Sharma, "Selective Text Encryption for E-Governance," in Proc. 5th Int. Conf. Emerging Technol. Trends, pp. 267-278, 2023.
  2. J.K., M. Patel, and R. Gupta, "Performance Metrics for Cryptographic Algorithms: An Overview," IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4357-4370, 2022.
  3. S.K. and A. Singh, "Securing Mobile Messages Using AES and Blockchain," ResearchGate Preprint, 2023.
  4. N.M., P. Singh, and D. Sharma, "Rotor64: A Modern Lightweight Cryptography Mechanism," Multimedia Tools and Applications, 2023.
  5. L.W., H. Zhao, and Y. Chen, "Advanced Cryptographic Techniques for Secure Cloud Systems," IEEE Cloud Computing, vol. 9, no. 4, pp. 17-26, 2021.
  6. A. Kumar, V. Patel, and M. Shah, "ChaCha20 vs. AES-256: A Performance Benchmark in Edge Devices," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 345-360, 2023.
  7. A. Sharma, "Hybrid Cryptographic Systems: Balancing Efficiency and Security," IEEE Access, vol. 8, pp. 89763-89772, 2021.
  8. S. Lee and P.H. Lee, "Secure Nonce Generation for Lightweight Cryptography in IoT Networks," Journal of Network and Computer Applications, vol. 215, pp. 103-118, 2024.
  9. Y.Z., T. Liu, and M. Wang, "DNA Coding and Chaotic Maps for Secure Encryption," Human-centric Computing and Information Sciences, vol. 12, pp. 16-30, 2022.
  10. R. Patel and A.J. Patel, "Performance Trade-offs Between SHA-256 and BLAKE3 in Real-Time Systems," IEEE Internet of Things Journal, vol. 10, no. 5, pp. 4321-4335, 2023.
  11. C. Peikert, "Post-Quantum Cryptography: Security in the Quantum Era," IEEE Transactions on Information Theory, vol. 67, no. 10, pp. 6679-6719, 2021.
  12. Y. Zhang, L. Zhou, and P. Zhao, "Efficient Data Integrity Verification for Cloud Storage Using SHA-256 and Merkle Trees," Future Generation Computer Systems, vol. 148, pp. 200-215, 2023.
  13. I. Mishkhal, N. Abdullah, H.H. Saleh, N.I.R. Ruhaiyem, and F.H. Hassan, "Facial Swap Detection Based on Deep Learning: Comprehensive Analysis and Evaluation," Iraqi Journal for Computer Science and Mathematics, vol. 6, no. 1, Article 8, 2025, [Online]. Available: https://doi.org/10.52866/2788-7421.1229
  14. S.R. Das and R.C.A. Das, "Lightweight Cryptography for IoT Devices: Challenges and Future Directions," Springer Advances in Intelligent Systems and Computing, vol. 1042, pp. 141-153, 2020.
  15. D. Bernstein, "The ChaCha20 Encryption Algorithm: High-Speed and Secure," IETF RFC 8439, 2018.
  16. S.T., M. Johnson, and K. Brown, "Performance Evaluation of Stream Ciphers: A Case Study of ChaCha20," IEEE Access, vol. 9, pp. 120437-120446, 2021.
  17. NIST, "Secure Hash Standard (SHS): SHA-256 and SHA-3 Families," NIST Special Publication, 2020.
  18. R.R., L. Anderson, and J. Clark, "Hash Functions for Cryptographic Integrity," ACM Computing Surveys, vol. 53, no. 4, pp. 1-29, 2021.
  19. H.L. Kim and S.P.J. Kim, "Performance and Resource Utilization Analysis of Lightweight Cryptographic Algorithms," IEEE IoT Journal, vol. 8, no. 5, pp. 3205-3218, 2021.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.