Evaluation Framework for Security and Resource Consumption of Cryptographic Algorithms

被引:0
|
作者
Duta, Cristina-Loredana [1 ]
Mocanu, Bogdan-Costel [1 ]
Vladescu, Florin-Alexandru [1 ]
Gheorghe, Laura [1 ]
Tapus, Nicolae [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Comp Sci & Engn, Bucharest, Romania
来源
关键词
cryptography; randomness tests; S-boxes; P-boxes; performance evaluation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, security is necessary when transmitting confidential information over the network. One of the most important ways to provide data confidentiality is through cryptography. In this paper, we present a framework for testing and evaluating cryptographic algorithms. When evaluating block and stream ciphers, some basic properties should be tested: correct functional testing, passing statistical randomness testing, having good substitution boxes (S-boxes) and good permutation boxes (P-boxes) in their construction and providing a good throughput. The proposed framework receives the cryptographic algorithm as input and evaluates: the provided test vectors, the randomness of the generated data, the properties of the S-boxes and the P-boxes, the performance in terms of speed and throughput and provides a result, whether or not the algorithm is secure and can be used in cryptographic applications.
引用
收藏
页码:77 / 87
页数:11
相关论文
共 50 条
  • [21] The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
    Tutubalin, Pavel Innokentievich
    Mokshin, Vladimir Vasilevich
    [J]. 2017 SECOND RUSSIA AND PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC 2017), 2017, : 180 - 183
  • [22] Security Analysis of Cryptographic Algorithms: Hints from Machine Learning
    Paravisi, Mattia
    Visconti, Andrea
    Malchiodi, Dario
    [J]. ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2024, 2024, 2141 : 569 - 580
  • [23] Cryptographic Strength Evaluation of Key Schedule Algorithms
    Afzal, Shazia
    Yousaf, Muhammad
    Afzal, Humaira
    Alharbe, Nawaf
    Mufti, Muhammad Rafiq
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [24] Comprehensive analysis on lightweight cryptographic algorithms for low resource devices
    Girija, M.
    Manickam, P.
    Ramaswami, M.
    [J]. Test Engineering and Management, 2019, 81 (11-12): : 3747 - 3760
  • [25] Security Evaluation Over Lightweight Cryptographic Protocols
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 171 - 175
  • [26] Research and Security Evaluation of AUTH-VRF Model for NCS Network Based on Domestic Cryptographic Algorithms
    Xia, Xiaofeng
    Xiang, Hong
    Xiao, Zhenyu
    Cai, Ting
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1846 - 1852
  • [27] Research and Security Evaluation of AUTH-VRF Model for NCS Network Based on Domestic Cryptographic Algorithms
    Xia Xiaofeng
    Xiang Hong
    Xiao Zhenyu
    Cai Ting
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1846 - 1852
  • [28] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
    Piatkowski, Jacek
    Szymoniak, Sabina
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (23):
  • [29] An extended analytical framework for heterogeneous implementations of light cryptographic algorithms
    Damaj, Issam W.
    Al-Mubasher, Hadi
    Saadeh, Mahmoud
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 154 - 172
  • [30] Information Security using Visual Cryptographic Technique for Resource Constrained Devices
    Singh, Rahul Kumar
    Singh, Brijendra Pratap
    Gore, M. M.
    [J]. 2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,