Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security Assessment of Cryptographic Algorithms

  • Conference paper
  • First Online:
Computer Network Security (MMM-ACNS 2017)

Abstract

This article presents a way to assess security of block cryptographic algorithms in universal manner. We presented implementation of test methods that analyse input and corresponding output of a cryptography algorithm and assign a metric for evaluation how strong is the encryption scheme. The methods – inspired by NIST test suit – are based on specified threshold for accepting the test result (P-value). The methods were validated in practise using several experiments. We checked behaviours of secure and unsecure cryptographic algorithms: AES, DES and Ceasar cipher, as well as idealized encryption scheme as a reference. The methods were packed in a framework that can be used as a cryptographic assessment tool for cryptographers, requiring only a slight knowledge of programming language from them. As experiments has shown, test suit proposed in this paper can be used to check whether encryption scheme has some properties or features which are expected from a good cryptographic algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kurek, T., Lason, A., Niemiec, M.: First step towards preserving the privacy of cloud-based IDS security policies. Secur. Commun. Netw. 8(18), 3481–3491 (2015)

    Article  Google Scholar 

  2. Zhao, K., Ge, L.: A survey on the Internet of Things security. In: IX International Conference on Computational Intelligence and Security, Leshan (2013)

    Google Scholar 

  3. Stoianov, N., Uruena, M., Niemiec, M., Machnik, P., Maestro, G.: Security infrastructures: towards the INDECT system security. Multimed. Commun. Serv. Secur. 287, 304–315 (2012)

    Article  Google Scholar 

  4. Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  5. Stallings, W.: Cryptography and Network Security: Principles and Practices. Prentice Hall, Upper Saddle River (2005)

    Google Scholar 

  6. Niemiec M., Machowski.: A new symmetric block cipher based on key-dependent S-boxes. In: IV International Congress on Ultra Modern Telecommunications and Control Systems, St. Petersburg (2012)

    Google Scholar 

  7. Sadowski, A.: Wybrane zagadnienia kryptologii i ochrony informacji. Helion (1999)

    Google Scholar 

  8. NIST SP-800-22: A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology (NIST) (2000)

    Google Scholar 

  9. McCaffrey, J.: Test Run - Implementing the National Institute of Standards and Technology Tests of Randomness Using C (2013). https://msdn.microsoft.com/enus/magazine/dn520240.aspx

  10. Gustafson, H., Dawson, E., Pettitt, A.N.: Strict key avalanche criterion. Aust. J. Comb. 6, 147–153 (1992)

    MATH  Google Scholar 

  11. Dodis, Y., Puniya, P.: On the relation between the ideal cipher and the random oracle models. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 184–206. Springer, Heidelberg (2006). doi:10.1007/11681878_10

    Chapter  Google Scholar 

Download references

Acknowledgments

This work was funded by the Polish National Centre for Research and Development under “SDNRoute: integrated system supporting routing in Software Defined Networks”, project number LIDER/30/0006/L-7/15/NCBR/2016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcin Niemiec .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Niemiec, M., Francikiewicz, M. (2017). Security Assessment of Cryptographic Algorithms. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65127-9_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65126-2

  • Online ISBN: 978-3-319-65127-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics