{"title":"某些密码系统的安全性评估方法及使用的参数","authors":"S. Sadkhan, S. F. Jawad","doi":"10.1109/CSASE48920.2020.9142076","DOIUrl":null,"url":null,"abstract":"the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"AES-7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Security Evaluation Methods and the used parameters for Some Cryptosystem\",\"authors\":\"S. Sadkhan, S. F. Jawad\",\"doi\":\"10.1109/CSASE48920.2020.9142076\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.\",\"PeriodicalId\":254581,\"journal\":{\"name\":\"2020 International Conference on Computer Science and Software Engineering (CSASE)\",\"volume\":\"AES-7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computer Science and Software Engineering (CSASE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSASE48920.2020.9142076\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computer Science and Software Engineering (CSASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSASE48920.2020.9142076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Evaluation Methods and the used parameters for Some Cryptosystem
the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.