PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Statistical analysis of enhanced SDEx encryption method based on BLAKE3 hash function

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper presents a statistical analysis of the enhanced SDEx (Secure Data Exchange) encryption method, using a version that incorporates two session keys. This method has not previously been combined with the BLAKE3 hash function. The statistical analysis was conducted using the NIST Statistical Test Suite. Several real-world sample files were encrypted using the proposed method and then subjected to statistical analysis through selected tests from the NIST suite. These tests aimed to determine whether the resulting ciphertexts meet the criteria for pseudorandomness. Additionally, compression tests were performed using WinRAR, which confirmed that the ciphertexts are not compressible.
Twórcy
  • University of Lodz, Poland
  • Lodz University of Technology, Poland
  • University of Lodz
Bibliografia
  • [1] Cisco „Cisco Annual Internet Report (2018-2023) White Paper”, 2020
  • [2] M. Satyanarayanan, "The Emergence of Edge Computing" in Computer, vol. 50, no. 1, pp. 30-39, Jan. 2017. https://doi.org/10.1109/MC.2017.9
  • [3] H. HaddadPajouh, R. M. Parizi, “A survey on Internet of Things security: Requirements, challenges, and solutions”, Internet of Things, vol. 14, pp. 100-129, 2019. https://doi.org/10.1016/j.iot.2019.100129
  • [4] W. Stallings, “Cryptography and Network Security: Principles and Practice”, 8th ed., Pearson, 2023
  • [5] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, 20th Anniversary Edition, Wiley, 2015
  • [6] R. Roman, et al., "Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges", Future Generation Computer Systems, vol. 78, Part 2, pp. 680-698, 2018. https://doi.org/10.1016/j.future.2016.11.009
  • [7] S. Thakur, S. Banik and F. Regazzoni, “Energy Analysis of Cryptographic Algorithms in Server Environment”, In Proceedings of the 2024 on Cloud Computing Security Workshop (CCSW '24), ACM, New York, pp. 3-14, 2024. https://doi.org/10.1145/3689938.3694775
  • [8] J. Soto-Cruz, et al., “A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers” Technologies, 13(1), 3, 2025. https://doi.org/10.3390/technologies13010003
  • [9] T. K. Goyal, et al., “Energy Efficient Lightweight Cryptography Algorithms for IoT Devices, IETE Journal of Research, 68(3), pp. 1722-1735, 2019. https://doi.org/10.1080/03772063.2019.1670103
  • [10] M. Minier, et al., “Energy-Efficient Cryptographic Engineering Paradigm”, In: Camenisch, J., Kesdogan, D. (eds) Open Problems in Network Security. iNetSec 2011. Lecture Notes in Computer Science, vol. 7039, pp. 78-80. Springer, Berlin, 2011. https://doi.org/10.1007/978-3-642-27585-2_7
  • [11] J.-P. Aumasson, et al., "BLAKE2: Simpler, Smaller, Fast as MD5”, In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds) Applied Cryptography and Network Security, ACNS 2013, Lecture Notes in Computer Science, vol 7954. Springer, Berlin, 2013. https://doi.org/10.1007/978-3-642-38980-1_8
  • [12] J.-P. Aumasson, "BLAKE3: one function, fast everywhere", 2020. https://github.com/BLAKE3-team/BLAKE3
  • [13] National Institute of Standards and Technology, "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions", FIPS PUB 202, 2015. https://doi.org/10.6028/NIST.FIPS.202
  • [14] A. Hłobaż, "Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function" 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, pp. 238-241 2019. https://doi.org/10.1109/LCN44214.2019.8990714
  • [15] A. Hłobaż, "Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function" 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 2020, pp. 1-6. https://doi.org/10.1109/ICCCN49398.2020.9209663
  • [16] A. Hłobaż, “Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method”, International Journal of Electronics and Telecommunications, 2022, pp. 57-62. https://doi.org/10.24425/ijet.2022.139848
  • [17] A. Hłobaż, K. Podlaski, P. Milczarski, “Enhancements of encryption method used in SDEx, Communications in Computer and Information Science”, vol. 718, pp. 134-143, Springer International Publishing, 2017. http://doi.org/10.1007/978-3-319-59767-6_11
  • [18] P. Milczarski, A. Hłobaż, K. Podlaski, “Analysis of enhanced SDEx method”, Proceedings of the 2017 IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS, 2017. https://doi.org/10.1109/IDAACS.2017.8095245
  • [19] Milczarski P., Podlaski K., Hłobaż A., Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys, Communications in Computer and Information Science Vol. 522, pp. 389-399, Springer International Publishing, 2015
  • [20] https://github.com/BLAKE3-team/BLAKE3/
  • [21] A. Rukhin, et al., “A statistical test suite for random and pseudorandom number generators for cryptographic applications”, NIST Special Publication 800-22, National Institute of Standards and Technology, 2010. https://doi.org/10.6028/NIST.SP.800-22r1a
  • [22] J. Soto, “Statistical Testing of Random Number Generators”, NIST, 1999. https://csrc.nist.rip/nissc/1999/proceeding/papers/p24.pdf
  • [23] G. Szewczyk, “The Dynamic Ciphers - New Concept Of Long-Term Content Protecting”, Annales Universitatis Apulensis Series Oeconomica, Faculty of Sciences, "1 Decembrie 1918" University, Alba Iulia, vol. 2(10), pp. 1-34, 2008.
Uwagi
This work is a continuation of research carried out thanks to a grant from the National Science Centre (no. 2020/04/X/ST6/00407).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b32705fe-419b-4425-b559-b9586f3d979f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.