@niko

Ranking Cryptographic Algorithms

, , and . Socio-technical Design of Ubiquitous Computing Systems, page 151-171. Berlin, Springer, (2014)

Abstract

In many applications of our daily life information security plays a key role. This applies even stronger for ubiquitous computing applications where a multitude of sensors and actuators observe and control our physical environment. When developing such applications a software engineer usually relies on well-known cryptographic mechanisms like encryption or hashing. However, due to the multitude of existing cryptographic algorithms it can be challenging to select an adequate and secure one. A software engineer is not necessarily also an information security expert and, therefore, it is not obvious which one offers enough security. A general method to rank cryptographic algorithms by their strengths would mitigate this problem. With the availability of such a ranking a software engineer can either look up the current ranking of an algorithm or perform the ranking himself to determine the current strength of such an algorithm. In this chapter we present a novel method to rank cryptographic algorithms with respect to their current strengths. We evaluate our method by applying it to existing cryptographic algorithms.

Links and resources

Tags

community

  • @olya
  • @wacker
  • @dblp
  • @niko
@niko's tags highlighted