Evaluation Framework for Security and Resource Consumption of Cryptographic Algorithms

被引:0
|
作者
Duta, Cristina-Loredana [1 ]
Mocanu, Bogdan-Costel [1 ]
Vladescu, Florin-Alexandru [1 ]
Gheorghe, Laura [1 ]
Tapus, Nicolae [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Comp Sci & Engn, Bucharest, Romania
来源
关键词
cryptography; randomness tests; S-boxes; P-boxes; performance evaluation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, security is necessary when transmitting confidential information over the network. One of the most important ways to provide data confidentiality is through cryptography. In this paper, we present a framework for testing and evaluating cryptographic algorithms. When evaluating block and stream ciphers, some basic properties should be tested: correct functional testing, passing statistical randomness testing, having good substitution boxes (S-boxes) and good permutation boxes (P-boxes) in their construction and providing a good throughput. The proposed framework receives the cryptographic algorithm as input and evaluates: the provided test vectors, the randomness of the generated data, the properties of the S-boxes and the P-boxes, the performance in terms of speed and throughput and provides a result, whether or not the algorithm is secure and can be used in cryptographic applications.
引用
收藏
页码:77 / 87
页数:11
相关论文
共 50 条
  • [11] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [12] Enhancing financial transaction security with lightweight cryptographic algorithms
    Deshpande, Vivek
    Khubalkar, Deepti
    Dhablia, Anishkumar
    Pasha, M. Jahir
    Dhabliya, Dharmesh
    Gandhi, Yatin
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 741 - 751
  • [13] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [14] High Level Energy Consumption Estimation of Cryptographic Algorithms
    Khaddour, M.
    Hammami, O.
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2627 - 2632
  • [15] Circuits for Security and Secure Circuits: Implementation of cryptographic algorithms
    Verbauwhede, Ingrid
    [J]. IEEE Solid-State Circuits Magazine, 2023, 15 (01): : 20 - 24
  • [16] Security of internet of things based on cryptographic algorithms: a survey
    Seyyed Keyvan Mousavi
    Ali Ghaffari
    Sina Besharat
    Hamed Afshari
    [J]. Wireless Networks, 2021, 27 : 1515 - 1555
  • [17] Review and Open issues of Cryptographic Algorithms in Cyber Security
    Soomro, Safeeullah
    Belgaum, Mohammad Riyaz
    Alansari, Zainab
    Jain, Ruchin
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 158 - 162
  • [18] A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
    Mihaljevic, Miodrag J.
    [J]. ENTROPY, 2019, 21 (07)
  • [19] Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
    Chong, Bang Yuan
    Salam, Iftekhar
    [J]. CRYPTOGRAPHY, 2021, 5 (04)
  • [20] A Comprehensive Evaluation of Cryptographic Algorithms in Cloud Computing
    Kulshrestha, Vartika
    Verma, Seema
    Challa, C. Rama K.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 32 - 36