Skip to main content
Top

2017 | OriginalPaper | Chapter

Security Assessment of Cryptographic Algorithms

Authors : Marcin Niemiec, Maciej Francikiewicz

Published in: Computer Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This article presents a way to assess security of block cryptographic algorithms in universal manner. We presented implementation of test methods that analyse input and corresponding output of a cryptography algorithm and assign a metric for evaluation how strong is the encryption scheme. The methods – inspired by NIST test suit – are based on specified threshold for accepting the test result (P-value). The methods were validated in practise using several experiments. We checked behaviours of secure and unsecure cryptographic algorithms: AES, DES and Ceasar cipher, as well as idealized encryption scheme as a reference. The methods were packed in a framework that can be used as a cryptographic assessment tool for cryptographers, requiring only a slight knowledge of programming language from them. As experiments has shown, test suit proposed in this paper can be used to check whether encryption scheme has some properties or features which are expected from a good cryptographic algorithm.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kurek, T., Lason, A., Niemiec, M.: First step towards preserving the privacy of cloud-based IDS security policies. Secur. Commun. Netw. 8(18), 3481–3491 (2015)CrossRef Kurek, T., Lason, A., Niemiec, M.: First step towards preserving the privacy of cloud-based IDS security policies. Secur. Commun. Netw. 8(18), 3481–3491 (2015)CrossRef
2.
go back to reference Zhao, K., Ge, L.: A survey on the Internet of Things security. In: IX International Conference on Computational Intelligence and Security, Leshan (2013) Zhao, K., Ge, L.: A survey on the Internet of Things security. In: IX International Conference on Computational Intelligence and Security, Leshan (2013)
3.
go back to reference Stoianov, N., Uruena, M., Niemiec, M., Machnik, P., Maestro, G.: Security infrastructures: towards the INDECT system security. Multimed. Commun. Serv. Secur. 287, 304–315 (2012)CrossRef Stoianov, N., Uruena, M., Niemiec, M., Machnik, P., Maestro, G.: Security infrastructures: towards the INDECT system security. Multimed. Commun. Serv. Secur. 287, 304–315 (2012)CrossRef
5.
go back to reference Stallings, W.: Cryptography and Network Security: Principles and Practices. Prentice Hall, Upper Saddle River (2005) Stallings, W.: Cryptography and Network Security: Principles and Practices. Prentice Hall, Upper Saddle River (2005)
6.
go back to reference Niemiec M., Machowski.: A new symmetric block cipher based on key-dependent S-boxes. In: IV International Congress on Ultra Modern Telecommunications and Control Systems, St. Petersburg (2012) Niemiec M., Machowski.: A new symmetric block cipher based on key-dependent S-boxes. In: IV International Congress on Ultra Modern Telecommunications and Control Systems, St. Petersburg (2012)
7.
go back to reference Sadowski, A.: Wybrane zagadnienia kryptologii i ochrony informacji. Helion (1999) Sadowski, A.: Wybrane zagadnienia kryptologii i ochrony informacji. Helion (1999)
8.
go back to reference NIST SP-800-22: A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology (NIST) (2000) NIST SP-800-22: A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology (NIST) (2000)
10.
go back to reference Gustafson, H., Dawson, E., Pettitt, A.N.: Strict key avalanche criterion. Aust. J. Comb. 6, 147–153 (1992)MATH Gustafson, H., Dawson, E., Pettitt, A.N.: Strict key avalanche criterion. Aust. J. Comb. 6, 147–153 (1992)MATH
11.
go back to reference Dodis, Y., Puniya, P.: On the relation between the ideal cipher and the random oracle models. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 184–206. Springer, Heidelberg (2006). doi:10.1007/11681878_10 CrossRef Dodis, Y., Puniya, P.: On the relation between the ideal cipher and the random oracle models. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 184–206. Springer, Heidelberg (2006). doi:10.​1007/​11681878_​10 CrossRef
Metadata
Title
Security Assessment of Cryptographic Algorithms
Authors
Marcin Niemiec
Maciej Francikiewicz
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_24

Premium Partner