Abstract
This article presents a way to assess security of block cryptographic algorithms in universal manner. We presented implementation of test methods that analyse input and corresponding output of a cryptography algorithm and assign a metric for evaluation how strong is the encryption scheme. The methods – inspired by NIST test suit – are based on specified threshold for accepting the test result (P-value). The methods were validated in practise using several experiments. We checked behaviours of secure and unsecure cryptographic algorithms: AES, DES and Ceasar cipher, as well as idealized encryption scheme as a reference. The methods were packed in a framework that can be used as a cryptographic assessment tool for cryptographers, requiring only a slight knowledge of programming language from them. As experiments has shown, test suit proposed in this paper can be used to check whether encryption scheme has some properties or features which are expected from a good cryptographic algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kurek, T., Lason, A., Niemiec, M.: First step towards preserving the privacy of cloud-based IDS security policies. Secur. Commun. Netw. 8(18), 3481–3491 (2015)
Zhao, K., Ge, L.: A survey on the Internet of Things security. In: IX International Conference on Computational Intelligence and Security, Leshan (2013)
Stoianov, N., Uruena, M., Niemiec, M., Machnik, P., Maestro, G.: Security infrastructures: towards the INDECT system security. Multimed. Commun. Serv. Secur. 287, 304–315 (2012)
Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
Stallings, W.: Cryptography and Network Security: Principles and Practices. Prentice Hall, Upper Saddle River (2005)
Niemiec M., Machowski.: A new symmetric block cipher based on key-dependent S-boxes. In: IV International Congress on Ultra Modern Telecommunications and Control Systems, St. Petersburg (2012)
Sadowski, A.: Wybrane zagadnienia kryptologii i ochrony informacji. Helion (1999)
NIST SP-800-22: A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology (NIST) (2000)
McCaffrey, J.: Test Run - Implementing the National Institute of Standards and Technology Tests of Randomness Using C (2013). https://msdn.microsoft.com/enus/magazine/dn520240.aspx
Gustafson, H., Dawson, E., Pettitt, A.N.: Strict key avalanche criterion. Aust. J. Comb. 6, 147–153 (1992)
Dodis, Y., Puniya, P.: On the relation between the ideal cipher and the random oracle models. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 184–206. Springer, Heidelberg (2006). doi:10.1007/11681878_10
Acknowledgments
This work was funded by the Polish National Centre for Research and Development under “SDNRoute: integrated system supporting routing in Software Defined Networks”, project number LIDER/30/0006/L-7/15/NCBR/2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Niemiec, M., Francikiewicz, M. (2017). Security Assessment of Cryptographic Algorithms. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)