{"title":"Security Evaluation of Cryptosystems based on Orthogonal Transformation","authors":"S. Sadkhan, S. F. Jawad","doi":"10.1109/IEC49899.2020.9122828","DOIUrl":null,"url":null,"abstract":"Proposed approach for security evaluation of some cipher systems based on orthogonal transformation is introduced in this paper. This approach based on using the Discrete Fourier transform (DFT) as a main processor in the evaluation process. The mean value of the DFT coefficients of the ciphered outputs is considered as an evaluation parameter for evaluating the security of the considered cipher system. This approach was tested on symmetric and asymmetric cryptosystems. For symmetric one, we choose a stream cipher system to be tested by this method. While for a symmetric one we chose the RSA (public key cryptosystem). These different choices gave a wide spread use for this proposed method in comparison with other evaluation methods. The results were encouraging, and can be considered as a suitable approach to enhance the security evaluation tasks. That is really considered as a hard problem facing the cryptosystem design.","PeriodicalId":273236,"journal":{"name":"2020 6th International Engineering Conference “Sustainable Technology and Development\" (IEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 6th International Engineering Conference “Sustainable Technology and Development\" (IEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEC49899.2020.9122828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Proposed approach for security evaluation of some cipher systems based on orthogonal transformation is introduced in this paper. This approach based on using the Discrete Fourier transform (DFT) as a main processor in the evaluation process. The mean value of the DFT coefficients of the ciphered outputs is considered as an evaluation parameter for evaluating the security of the considered cipher system. This approach was tested on symmetric and asymmetric cryptosystems. For symmetric one, we choose a stream cipher system to be tested by this method. While for a symmetric one we chose the RSA (public key cryptosystem). These different choices gave a wide spread use for this proposed method in comparison with other evaluation methods. The results were encouraging, and can be considered as a suitable approach to enhance the security evaluation tasks. That is really considered as a hard problem facing the cryptosystem design.