Multiple New Formulas for Cipher Performance Computing

Multiple New Formulas for Cipher Performance Computing

International Journal of Network Security, Vol.20, No.4, PP.788-800, July 2018 (DOI: 10.6633/IJNS.201807 20(4).21) 788 Multiple New Formulas for Cipher Performance Computing Youssef Harmouch1, Rachid Elkouch1, Hussain Ben-azza2 (Corresponding author: Youssef Harmouch) Department of Mathematics, Computing and Networks, National Institute of Posts and Telecommunications1 10100, Allal El Fassi Avenue, Rabat, Morocco (Email:[email protected] ) Department of Industrial and Production Engineering, Moulay Ismail University2 National High School of Arts and Trades, Mekns, Morocco (Received Apr. 03, 2017; revised and accepted July 17, 2017) Abstract are not necessarily commensurate properties. For exam- ple, an online newspaper will be primarily interested in Cryptography is a science that focuses on changing the the integrity of their information while a financial stock readable information to unrecognizable and useless data exchange network may define their security as real-time to any unauthorized person. This solution presents the availability and information privacy [14, 23]. This means main core of network security, therefore the risk analysis that, the many facets of the attribute must all be iden- for using a cipher turn out to be an obligation. Until now, tified and adequately addressed. Furthermore, the secu- the only platform for providing each cipher resistance is rity attributes are terms of qualities, thus measuring such the cryptanalysis study. This cryptanalysis can make it quality terms need a unique identification for their inter- hard to compare ciphers because each one is vulnerable to pretations meaning [20, 24]. Besides, the attributes can a different kind of attack that is often very different from be interdependent. The first thing is to identify a set of others. Our contribution in this paper is to develop new security-related attributes that are important to the use risk analysis formulas to offer a theoretical background of the system. This leads to decide whether the system for both the cipher designer and the simple users. Those security must be represented as a vector or as a single formulas will help to suggest a fair platform for measuring value. risk, safety, complexity and cost, in order to determine a In large systems, risk analysis becomes a very painful quantifiable value for performance to each cipher. This task. The remaining solution to use the decomposition can lead to a fair comparison in a fair scale. method to develop simple, small and stand alone compo- Keywords: Complexity & Cost; Quantifiable-Value; Risk nents of the system. Therefore, in order to better measure Analysis; Security-Level; Security Performance risk analysis of the systems, it is necessary to seek for the common ground between all the systems and their com- ponents. This common ground is the security protocols 1 Introduction or algorithms. Since this latter is based on computer, mathematical and/or logical operations, the scale for risk Although, humans today constantly depend on computer analysis should be changed from macro scale (network technology in their life, they continue to have a hard application, software, threats, hardware, protocols, etc.) follow to security aspects between different technologies. to micro scale (cipher and algorithm). This is caused by the tiny ability to compare, to contrast, Thus, this research studies the cipher risk analysis and to make quantifiable statements about security sys- upon MLO (Mathematical or/and Computer Logical tems. This means that having a fixed global model for Operation). This paper proposes new risk formulas that information security is extremely valuable for having a represent an improvement in security quantification. By basis to determine where to put limited resources, pay calculating the security level offered by each MLO, the attention, and how to best secure systems. cryptograph can easily choose which MLO to use and However, risk analysis (quantitative or qualitative [16, where to place it, so as to increase the complication of 19]) remains a difficult problem, since computer security is the cipher/algorithm within the developing phase before a multidimensional attribute (confidentiality, availability, applying any cryptanalysis studies. This paper provides integrity, non-rejection, accountability, authenticity, reli- a fair comparison of security, risk and utilizing cost for ability of IT systems, etc.). Moreover, these dimensions several ciphers based on theirs MLO while respecting each International Journal of Network Security, Vol.20, No.4, PP.788-800, July 2018 (DOI: 10.6633/IJNS.201807 20(4).21) 789 cipher properties. These properties englobe inner struc- of any linear link between plaintext and ciphertext so as tures, key space, round number, complexity, successful to increase the complexity of breaking the cipher. cryptanalysis attacks, etc. to provide a value that deter- Cryptanalysis tests the weakness of the cryptosystem mines the safety degree of each cipher, in order to put a by trying to break it without any knowledge of the key fair platforms where ciphers can be judged and compared used. The most popular attack is the brute force where precisely. the cyber criminal tries every possible key to break ci- The paper is organized as follows. In Section 2, we in- phers; therefore, the only way to resist is by enlarging the troduce some concepts of cryptography, then we define the key space to make it infeasible [21]. different structures utilized by ciphers followed with an Thus, the question that needs to be asked is, \Which introduction of the most knowing cryptanalysis attacks, cipher is the best in security term and how can we measure after that, we introduce the ciphers used in this study. In its safety?" The ability to compare and/or to make quan- Section 3, we investigate the study and the development tifiable statements about system security is extremely of the new formulas for risk analysis, while in Section 4, valuable, since it offers a basis to determine how to best we focus on results and discussion. We conclude the paper secure the systems. Besides, the complete understanding in Section 5. of a subject cannot be done with neither measurements nor quantifying value as written by Lord Kelvin in 1883: 2 State of Art and Motivation \When you can measure what you are speaking about and express it in numbers you know something about it, Because information privacy has become a major concern but when you cannot measure it, when you cannot ex- for both users and companies, cryptography is considered press it in numbers, your knowledge is of a meager and as a standard for providing information trust, security, unsatisfactory kind" [23]. electronic financial transactions, controlling access to re- The development of the theory of measurements and sources and stopping non-authorized persons from obtain- quantifying cipher is the main motivation for this re- ing critical or private information. It must be mentioned search. However, it is a difficult problem due to The large that the strength of the cryptography algorithm depends number of structure and operation that cipher utilizes. on the length of the key, secrecy of the key, the complexity Moreover, in this research, the only trust measurements of the process and how they all work together [18]. used is based over probabilities. Ciphers differ with their construction structure. This Furthermore, this research alongside with cryptanal- leads to different types of comportment. These structures ysis tries to rate each cipher based on inner structure, can be organized as (for symmetric cryptography): key space, successful attacks, etc. in order to have a fair platform for comparison and does not try to replace the • Permutation network: is when a cipher uses a per- cryptanalysis, which is still the only science that tests the mutation box (P-box). This latter is used to permute cipher weakness. or transpose data across plaintext, retaining diffusion In this work, we try to answer the following questions: while transposing [9]. if a user has two ciphers, A1 and A2 while knowing that • Substitution network: is when a cipher uses a substi- the best successful cryptanalysis attack for A1 resp. A2 is tution box (S-box). It is used to obscure the linearity B1 resp. B2 and the two attacks have the same successful between the key and the ciphertext [7, 8]. rate, what is the best cipher to choose? If A1 is a bit quicker than A2 and B2 is a little less successful than B1, • Substitution permutation network: is when a cipher what is the most optimal cipher for a system/network? uses both S-box and P-box in its encryption function. Another question, if a user has multiple ciphers A1, A2, ··· , An, what is the order of the most suitable cipher • Feistel Network: is when a cipher uses a Feistel to her/his own system/network? i.e. what is the or- scheme. It is a technique used in the construction of der of ciphers which offers an acceptable resistance (not block cipher-based algorithms and mechanisms [13]. always the best) to cryptanalysis attacks, and which is If the two blocks (left and right) are not of equal the most suitable to the system/network (real time appli- length, then the scheme is called unbalanced Feistel cation, Full HD conferencing, high throughput network, scheme. data-center file encryption, etc.)? • Lai-Massey scheme: is when a cipher uses a Lai- Even if risk analysis proposed in this paper can be Massey scheme [26]. used for any type of encryption (symmetric, asymmetric, bloc, stream), this paper focuses on symmetric block ci- During the cipher design phase, the cryptograph applies phers like [12] \AES, Blowfish, Camellia, CAST-128/256, one or more structures, to determine the security level DES/3DES, GOST, IDEA, MARS, RC2, RC5, RC6, offered by the cipher besides its behavior. Those struc- Serpent, SHACAL2, SHARK, SKIPJACK, Three-way, tures in addition to nonlinear functions are an important Twofish, and XTEA".

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us