Security Evaluation of Cryptosystems based on Orthogonal Transformation

Proposed approach for security evaluation of some cipher systems based on orthogonal transformation is introduced in this paper. This approach based on using the Discrete Fourier transform (DFT) as a main processor in the evaluation process. The mean value of the DFT coefficients of the ciphered outputs is considered as an evaluation parameter for evaluating the security of the considered cipher system. This approach was tested on symmetric and asymmetric cryptosystems. For symmetric one, we choose a stream cipher system to be tested by this method. While for a symmetric one we chose the RSA (public key cryptosystem). These different choices gave a wide spread use for this proposed method in comparison with other evaluation methods. The results were encouraging, and can be considered as a suitable approach to enhance the security evaluation tasks. That is really considered as a hard problem facing the cryptosystem design.

[1]  Sattar B. Sadkhan,et al.  Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory , 2018, 2018 International Conference on Engineering Technology and their Applications (IICETA).

[2]  Soumitra Bhattacharya Cryptology and Information Security - Past, Present, and Future Role in Society , 2019 .

[3]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[4]  Sattar B. Sadkhan,et al.  Security Evaluation of Nonlinear Filterization Stream Cipher Based on Information Theory , 2014 .

[5]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[6]  Sattar B. Sadkhan,et al.  Complexity Evaluation of Constructing Method for Saturated Best Resilient Functions in Stream Cipher Design , 2019, 2019 1st AL-Noor International Conference for Science and Technology (NICST).

[7]  Sattar B. Sadkhan,et al.  A Proposed Security Evaluation Method for Bluetooth E0 Based on Fuzzy Logic , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).

[8]  Sattar B. Sadkhan,et al.  Proposed Enhancement of A5/1 stream cipher , 2019, 2019 2nd International Conference on Engineering Technology and its Applications (IICETA).

[9]  Sattar B. Sadkhan Al Maliky,et al.  Multidisciplinary in Cryptology , 2014 .

[10]  Sattar B. Sadkhan,et al.  Block cipher security evaluation based on fuzzy logic , 2013, 2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE).

[11]  Gerhard Goos,et al.  Applied Cryptography and Network Security , 2012, Lecture Notes in Computer Science.

[12]  Ziad Alqadi,et al.  Analysis of Stream Cipher Security Algorithm , 2007 .

[13]  Sattar B. Sadkhan,et al.  Security evaluation of cryptosystems used in cloud networks , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[14]  Sattar B. Sadkhan Al Maliky,et al.  RSA-Public Key Cryptosystems Based on Quadratic Equations in Finite Field , 2014 .

[15]  Steve Burnett,et al.  RSA Security's official guide to cryptography , 2001 .

[16]  Sattar B. Sadkhan,et al.  A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).