Evaluation Framework for Security and Resource Consumption of Cryptographic Algorithms

被引:0
|
作者
Duta, Cristina-Loredana [1 ]
Mocanu, Bogdan-Costel [1 ]
Vladescu, Florin-Alexandru [1 ]
Gheorghe, Laura [1 ]
Tapus, Nicolae [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Comp Sci & Engn, Bucharest, Romania
来源
关键词
cryptography; randomness tests; S-boxes; P-boxes; performance evaluation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, security is necessary when transmitting confidential information over the network. One of the most important ways to provide data confidentiality is through cryptography. In this paper, we present a framework for testing and evaluating cryptographic algorithms. When evaluating block and stream ciphers, some basic properties should be tested: correct functional testing, passing statistical randomness testing, having good substitution boxes (S-boxes) and good permutation boxes (P-boxes) in their construction and providing a good throughput. The proposed framework receives the cryptographic algorithm as input and evaluates: the provided test vectors, the randomness of the generated data, the properties of the S-boxes and the P-boxes, the performance in terms of speed and throughput and provides a result, whether or not the algorithm is secure and can be used in cryptographic applications.
引用
收藏
页码:77 / 87
页数:11
相关论文
共 50 条
  • [1] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    [J]. SENSORS, 2024, 24 (12)
  • [2] A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) : 128 - 143
  • [3] Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
    Aslan, Bora
    Yavuzer Aslan, Fusun
    Sakalli, M. Tolga
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [4] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
  • [5] Statistical Evaluation of Cryptographic Algorithms
    Andrasiu, Mircea
    Popescu, Adrian
    Simion, Gheorghe
    [J]. PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 473 - 476
  • [6] A Comparative Study of Cryptographic Algorithms for Cloud Security
    Yusufzai, Asifkhan
    Ranpara, Ripal
    Vora, Mital
    Kumbharana, C. K.
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 409 - 415
  • [7] Safe: Cryptographic Algorithms and Security Principles Gamification
    Al Kaabi, Latifa
    Al Ketbi, Wadha
    Al Khoori, Aysha
    Al Shamsi, Maitha
    Alrabaee, Saed
    [J]. PROCEEDINGS OF THE 2022 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2022), 2022, : 1169 - 1178
  • [8] Energy Consumption of Cryptographic Algorithms in Mobile Devices
    Toldinas, J.
    Damasevicius, R.
    Venckauskas, A.
    Blazauskas, T.
    Ceponis, J.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (05) : 158 - 161
  • [9] An Evaluation Framework for Security Algorithms Performance Realization on FPGA
    Guruprasad, S. P.
    Chandrasekar, B. S.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2018,
  • [10] Performance Evaluation of Symmetric Cryptographic Algorithms in resource constrained hardware for Wireless Sensor Networks
    Gonzalez-Arango, Juan C.
    Ocampo-Munera, Diana C.
    Castano-Londono, Luis
    Goez-Sanchez, David
    Velasquez-Velez, Ricardo
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2021, 19 (10) : 1632 - 1639