Abstract: Encryption is the most important mechanism to protect information. A variety of factors affect the design and implementation of cryptographic algorithms, such as symmetric, asymmetric, and hash functions. In other words, all the necessary components of information security must be considered from the technical, organizational, procedural and human aspects in a model of excellence. To meet these requirements in this study, a methodology was used that enables the development of a metamodel that allows evaluating the different factors that affect cryptographic design, taking into account various attributes. The encryption metamodel has four main components: policy and strategy, main processes, support processes, process control, highlighting that the interactions between the main and support processes configure the structure of the encryption system. The evaluation of these interactions was carried out using a score allocation system, which resulted in a complex matrix, which was transformed into incidence matrices, which are addressed by means of a Q-analysis. The results of the Q-analysis indicate that The most significant group of components to develop an encryption system consists of the following: human resources, R&D, standards and regulations, IT and standards.
Keywords:cryptography algorithmscryptography algorithms,cybernetic meta-modelcybernetic meta-model,Q-analysisQ-analysis.
Resumen: El cifrado es el mecanismo más importante para proteger la información. Una variedad de factores afecta el diseño e implementación de algoritmos criptográficos, como funciones simétricas, asimétricas y hash. Es decir, todos los componentes necesarios de la seguridad de la información deben considerarse desde los aspectos técnicos, organizativos, de procedimiento y humanos en un modelo de excelencia. Para cumplir con estos requisitos, en este estudio se utilizó una metodología que posibilita el desarrollo de un metamodelo que permite valorar los diferentes factores que afectan el diseño criptográfico, teniendo en consideración diversos atributos. El metamodelo de cifrado tiene cuatro componentes principales: política y estrategia, procesos principales, procesos de apoyo, control procesos, destacando que las interacciones entre los procesos principales y de apoyo configuran la estructura del sistema de cifrado. La valoración de estas interacciones fue realizada por medio de un sistema de asignación de puntajes, lo cual resultó en una matriz compleja, que fue transformada en matrices de incidencia, que se abordan por medio de un análisis-Q. Los resultados del análisis-Q indican que el grupo de componentes más significativos para desarrollar un sistema de cifrado consta de lo siguiente: recursos humanos, I+D, normas y reglamentos, TI . estándares.
Palabras clave: algoritmos criptográficos, meta-modelo cibernético, análisis-Q.
Determination of factors that affect the design of cryptographic algorithms by a cybernetic meta-model, validated with Q-analysis
Determinación de los factores que afectan el diseño de algoritmos criptográficos por medio de un meta-modelo cibernético, validado con análisis-Q
Received: 17 February 2020
Accepted: 31 March 2020
Cryptography is a main component of the world’s information security to transfer data from transmitter to receiver in the safest way [1]. The security of the cryptographic systems depends on two key factors; strength of algorithmsand key size. Various cryptographic algorithms are in three types of hash functions, symmetric key and asymmetric key algorithms. Therefore, the power of cryptography is strongly dependent on the design and implementation of cryptographic algorithms [2].
A user mainly desires a cryptographic algorithm with low cost and high performance [3]. Many researches compare different cryptographic algorithms [4][5][6]. Also, various technologies such as social engineering, mathematical science, physiological signals, and biometrics have been used for the design of cryptographic algorithms [7][8].
Depending on the usage of an algorithm, different technical and non-technical requirements should be considered for its design [9]. The constituent factors of the algorithms are put into a coherent system with logical integrity to analyze and measure their interactions. In [10] different algorithms are evaluated based on some factors such as key sizeand block size. Also in [11] explained cryptographic standards. As cited in a research by CompTIA, it was a fast growing industry with a rate of 5 to 7 percent in the first quarter of 2018 [12]. To raise the level of information security has been a significant concern. For a desired security system, the components should be developed considering technological, organizational, process and human dimensions [13], fit to a model of excellence to ensure acceptable level of security, and ensure stability and continuity [14][15]. At the organizational level, the information security management system (ISMS) [16][17] is the only known and pervasive system of this kind. ISMS is a general system and based on the first edition of the British Standards Institute (BSI). The International Telecommunication Union (ITU) also developed an information security management system for communication networks based on the 2008 edition of ISMS [18]. Later, the International Organization for Standardization (ISO) published an information security management for communication organizations [19], particularly for telecom operators. According to the management system, the formation and realization of sustainable security for a communication network require two features, i.e., the use of a suitable set of security controls and deployment based on an excellence model. In latter management system, the proper set of security controls is at least composed of process controls and excellence for security cycles. The cycles consist of four stages of design, implementation, measurement and improvement.
At the international level, the International Telecommunication Union has provided the example of the National Cyber Security Strategy for the systematic deployment of information security for the member states [20]. The European Network and Information Security Agency (ENISA) also has recommended the deployment of national cyber-security strategies (NSCC) for the EU member states [21]. Other types of security architecture patterns are also recommended for the realization of desired security. The most important one is the end-to-end security architecture pattern [22][23], which is based on the network architecture model. The pattern of enhancing the information security of critical infrastructures is an alternative type [24], which is based on a functional architectural model. Finally, the organizational security architecture of Sherwood Applied Business Security Architecture (SABSA) [25] is also based on organizational architectural model [24]. In [26], a generic model is provided to design cryptographic algorithms with six parameters such as goal, input, activities, output, outcomes and performance. This model ignores some significant factors like key size, block size, round number as well as their interactions.
The methodology for designing a model for cryptography algorithms was cybernetic approach (CA). CA is capable to encompass a process-oriented modeling to the nature of control in man, animal and machine and therefore is widely used in a broad fields such as engineering, mechanics, biology, psychology, and management [27][28]. CA is comprehensive, hierarchical, and physically understandable by applying a graph structure; it is capable to communicate among various components. CA is properly apt to the combinatorial nature of the cryptographic algorithms [29][30]. The cybernetic model constitutes four main parts, which are strategy/policy, main, support and control components [31]. Main Process: This type of process involves the raison d’etre of the system. In fact, by examining the cause of existence of each system, we can get to main process.
Strategy/Policy Development: In this component, based on the expected and approved strategies and policies in the system, a functional and comparison basis can be determined and designed (e.g., reference or standard values). As a result, based on these, we can recognize and control the functionality of the system.
Supportive Process: These processes are necessary for the fulfillment of the main processes. The support processes are classified into “hard” and “soft” ones. “Hard-support” processes are concrete and quantitatively measurable, such as the processes of development and supply of equipment, materials and infrastructure. “Soft-support” processes, such as many soft aspects, are not concrete but mainly measurable such as the development of management, organization, information and communication technologies (ICT), rules and regulation, standards, human resources, and so on.
Process/Product Control (Feedback) Process: It is referred to the activities which help system to monitor, measure, evaluate and finally control all processes in the main and supportive process modules and correct the deviations.
The cryptographic system includes algorithms, keys and protocols [32], and the main process or the raison d’etre of a typical cryptographic algorithm, in highest level, is shown in Figure 1.
The selection of cryptographic algorithm depends on its intended services. For instance, some cryptographic algorithms are better for confidentiality, but they are very weak for integration (e.g. one- time-pad). Similarly, some cryptographic algorithms are better for integration, but they do not provide proper confidentiality (e.g. ciphers of message confirmation). In designing a cryptographic algorithm, various fields of mathematical knowledge such as pseudo-random functions, Boolean functions [33], and symmetric random functions [34] are very important. There are many metrics for evaluating cryptographic algorithms, the most important of which are: key length, attack steps, attack time, rounds, algorithm strength, types, functions, complexity, speed, block size, flexibility, scalability, memory consumption, and encryption rate [35, 36, 37]. The components of the encryption algorithms are “hash function”, “symmetric algorithm” and “asymmetric algorithm”. Each of these components has a number of attributes that have assigned some variables to it, as shown in Figure 2.
The proposed cybernetic cryptography model in the conceptual level is presented in Figure 3. The model consists of four parts: the policy development, main, support and control processes. The main process includes cryptography algorithms. The support component is divided into two main categories, hard, soft sub-components. Soft component includes ten development sub-components as follows: the development of management, organization, human resources/education, research and development, standard, rule and regulation, financial resources, ICT, public/international relations or relations, and cultural aspects. The hard components include three sub-components namely, the development of infrastructure, equipment and materials. Finally, the control component encompasses both the controls of process and outputs as products. Also a more detailed cybernetic cryptography model is shown in Figure 4.
To design an efficient hierarchical cryptography algorithm, the significant factors are to be chosen and grouped properly. Based on the cybernetic model, there exist 13 meta-factors (Figure 4) that interacts with 4 modules in the core process (Figure 1). The interaction and importance of these factors were determinate by a broad interviews from a group of 30 experts. Then, the factors are grouped depending upon their interaction to the modules of the core process of the cryptography algorithm.
The indices of interaction matrix are shown in Table 1. These indices are in the range of 0 to 10 in the matrix to indicate the significance of the interaction, determined by the experts.
To indicate the impact of support indices on the core processes of the cryptographic algorithms design, an incidence matrix is created for data Matrix A (Table 1). Data Matrix A consists of two sets. Set D represents the support components indices and set C represents the four stages of the cryptographic algorithms.
D = {d1, d2, ···, d13}
C = {c1, c2, c3, c4}
Tables 2 and 3 show entities of the two sets above.
The incidence matrix, calculated from data matrix A, indicates the relationship between the members of the two sets. The matrix indicates the existence/nonexistence of a relationship between each member of the two sets. Matrix A is transformed into an incidence matrix B with using a "α–cut parameter", by defining a one-to-one function as is presented in equation (1):
Where bij or αij is the entity of the ith row and the jth column in the incidence matrix (zero or one) and aij is equivalent to the given matrix A. Therefore, the entity bij= 1 if and only if the entity i of set C interacts with the entity j of set D. The incidence matrix calculated from matrix A for α%70 is shown in Table 4.
By assigning different values for the α-cut parameter, different “incidence matrices” are obtained. The α-cuts intended for analysis include: α(%50) = 5, α(%60) = 6, α(%70) = 7, α(%80) = 8, α(%90) = 9, α(%100) = 10.
Multidimensional properties of the system are defined by a simplical complex set, or KD(C, λ), such that: The entities of set “D” represent the simplexes (support indicators) σp (di) and the entities of set C are vertices (cryptographic algorithm four stages). The simplexes of this complex are geometric shapes that represent the relationships that exist in the incidence matrix.
Conventionally, the dimensions of the simplex (p) are shown as captions, and the simplex is denoted by the element shown in parentheses [38]. The simplex dimension is equal to the number of corresponding vertices minus one. In the sample, the di are:
d(1) = {}, d(2) = {c1, c2, c3, c4}, d(3) = {c4},
d(4) = {c1, c3}, d(5) = {c1, c2, c3, c4},
d(6) = {c1, c2, c3, c4}, d(7) = {c1, c4},
d(8) = {c1, c2, c3, c4}, d(9) =}c1, c3, c4},
d(10) = {c1, c3, c4}, d(11) =}c1, c3, c4},
d(12) = {c1, c4}, d(13) = {c1}. Also the σp(di) simplexes are:
σ1(d7), σ3(d6), σ3(d5), σ1(d4), σ0(d3), σ3(d2), σ(d−1)(d1), σ0(d13), σ1(d12), σ2(d11), σ2(d10), σ2(d9), σ3(d8). Therefore, the maximum complex dimension is 3.
The q-connectivity between a subset is represented by the weakest relationship (The smallest common face) between the two consecutive di in the chain d1 to dn is expressed. The simplex relation that described by q-connectivity, is an equivalence relation that is a symmetric, reflective, and transitive relation. The q-Connectivity between the two consecutive di is as follows:
σ(−1)(d1), σ3(d2) → −1 σ3(d2), σ0(d3) → 0 σ1(d4), σ3(d5) → 1 σ3(d5), σ3(d6) → 3 σ1(d7), σ3(d8) → 1 σ3(d8), σ2(d9) → 2 σ2(d10), σ2(d11) → 2 σ3(d11), σ1(d12) → 1 σ0(d3), σ1(d4) → −1 σ3(d6), σ1(d7) → 1 σ2(d9), σ2(d10) → 2 σ1(d12), σ0(d13) → 0
The maximum connection dimension is 3.
For each dimension q of the complex set K, we define integer Qq as the number of distinct equivalence classes, such that each equivalence class is composed of q-connectivity simplexes. This Qq vector is a simplification basis that came into being for eliminating redundant effects in the set of equivalence simplexes.
The first structure vector, Q is:
Q = (Qdim3,Qdim2,Qdim1,Qdim0)
Q = (4, 3, 3, 2)
The second structure vector, P is:
P = (Pdim3, Pdim2, Pdim1, Pdim0)
P = (4, 7, 10, 12)
Pq represents the number of simplexes larger than or equal to q in the set K. Where, P denotes the number of repetitions of the simplexes connectivity (support indicators) to vertices (cryptographic algorithm four stages). The larger the P values for the higher dimensions, the greater the connection. In contrast, the Q vector represents the extent of the connections between the simplexes connected (support indicators) by a set of vertices (cryptographic algorithm four stages) [39].
Obstruction vector (Q∗) that specifies the information flow limitation during the complex. (Q∗) means whether the members of the simplex (each of the support indicators) in any of the equivalence classes in the k-dimension can interact directly or indirectly at the k-level (have effect on each other). The number
of barriers to these interactions in the k-dimension is the number of "gaps" between the equivalence categories. Therefore, (Q∗) is created by subtracting a vector I from the structure vector, which includes all categories. That is mean:
Q∗ = [4, 3, 3, 2, ] − [1, 1, 1, 1, ]
Q∗ = [3, 2, 2, 1]
The value of Q∗K represents the number of structural constraints for the simplex interactions in the k dimension. Depending on the type of problem, high or low values of Q* elements may be preferred. For example, we prefer to have high obstruction between diagnostic values so that they are easily recognizable.
Due to the obtained values, it can be concluded that the effective indicators in designing the cryptographic algorithms are varied and sometimes independent. The obstruction vector and the equivalence classes at each level q with the cutoff parameter α = 7 are shown in Table 5.
The high value of this vector indicates system inflexibility [40]. Instead, its low value indicates high flexibility for the system. In fact, this vector is an appropriate index for the qualitative evaluation of system data in mathematics language. This flexibility or lack thereof can be attributed to the behavior of any of the q-levels. It is therefore necessary that all q-levels in the inflexibility vector be evaluated individually to obtain the degree of flexibility of each element. The high amount of flexible vector indicates that the system is more stable and less susceptible to oscillations caused by external stimuli [38].
While the structure vectors and the obstruction vectors describe the overall structural properties; the eccentricity indicates the degree of integration of a particular simplex throughout the complex. Conventional measurement of eccentricity for a simplex is the method defined in [41], called ecc according to equation (2). But Chin et al. in [42] offer another way of measuring eccentrecity called ecc' according to equation (3):
where in: is the simplex of σ. q∗ is the largest common dimension of the simplex σ with other simplexes (the relation value) in an equivalence class. qi is any q-level of σ that exists. σi The number of elements in the σi equivalence classes at the level of qi. qmax is the maximum q of the complex set level.
Difference (qˆ − q∗) is a criterion for determining the joint range of σ with another simplex which it has the most common vertices with it. Therefore, ecc depends only on one simplex over the others, while ecc0 also depends on all other simplexes. In addition, the value of ecc is in the range [0, ∞] and ecc0 is in the range [0, 1].
For each simplexes of set (support indices), the degree of eccentricity can be defined in two ways, according to the conventional method proposed by Casti (ecc(σ)) and based on the results of the Q- analysis performed for the data matrix A (Table 1), the eccentricity for all parameters equals zero. As a result, this method is not a suitable method for measuring the degree of eccentricity in the indices communication. Therefore, we use the Chinese method (ecc'(σ)) for this purpose. The results can be seen in Table 6.
The lower eccentricities, the simplex corresponds better to the overall complex structure.
The results of the Q-analysis can also be used to describe the complexity of the system structure. The complexity criterion, proposed in [43], is presented in equation (4):
So Qk is part of k of the vector structure of Q. The scale satisfies the principles outlined above. Explicitly states that both the dimension and the number of equivalence classes factors are related to the complexity of the structure. For α − cut = 7:
Q = (Qdim3,Qdim2,Qdim1,Qdim0)
Q = (4, 3, 3, 2)
It is obviously that due to the variety of supporting indexes that are effective in designing cryptographic algorithms, there is a relatively high degree of complexity between the indexes, which number 2,7 confirms this.
The results of implementing the Q-Analysis model using a C++ code, for α%70 = 7, are shown in Figure 5.
The result of applying Q-analysis on the “interaction matrix” cited in Figure 5, is shown in Table 7. The strength of the connectivity of the factors in a group is determined by α − cut, shown in percentage.
Thus, the support components are grouped in 5 levels or ranks. Each level indicates the priority and importance of the group in the process of developing a cryptographic algorithm.
For a proper resource allocation, the components in the higher level of the pyramid (Figure 6) have higher priority.
The results about the priority and importance of the group in the process of developing a cryptographic algorithm were compared to the Global Cybersecurity Index (GCI) reports of 2015, 2017 and 2018 issued by International Telecommunication Union (ITU) [44][45][43]. results of the cybernetic model and Q- analysis to group and rank the support components is determined. The results are compared to the Global
Cybersecurity Index (GCI) reports of 2015, 2017 and 2018 issued by International Telecommunication Union (ITU) [44][45][43]. The focus was on cryptography. The reports focus on five indices that are “legal, organization, technical, capacity building, and cooperation. The relevant sub-indices are as follows:
Legal: Cybercrime legislation, Cybersecurity Regulation, Containment/curbing of spam legislation.
Technical: National/ Government/ Sectorial CERT/CIRT/CSIRT, Standard, technical mechanisms.
Organization: Strategy, Responsible Agency, Cybersecurity Metrics.
Capacity Building: Public Awareness, Cybersecurity Standards and Certification for professionals, Cybersecurity Professional Training Courses, National Education Programs and Academic Curriculums, Cybersecurity Research & Development Programs, Incentive Mechanisms.
Cooperation: Bilateral Agreements, Multilateral Agreements, Public-private partnership, Interagency/intra-agency partnerships.
The indices of Cybersecurity for the highest ranked countries, issued in GCI 2015, 1017, and 2018 are presented in Tables 8, 9 and 10.
Based on the indices presented in Tables 8, 9 and 10 the relevant sub-indices, GCI reports indicate that regulation, standard, R&D, education, and managementhave the highest priority in developing cybersecurity or cryptographic algorithms.
The cybernetic meta-model of encryption has the following four components: policy and strategy, main processes, supportive processes, control processes. The main processes has four processes. Also, the supportive processes encompasses 13 processes, grouped in hardand soft ones. These processes have four development stageswhich determine type of applications, proper theoretical basis, implementation, and evaluation.
The interactions of mainand supportive processes shape the structure of the encryption system. These interactions result in a complex graph. A proper method to tackle such a complex entity is Q-analysis, which groups and ranks the components due to their interactions. Each interaction is also evaluated, based on its four development stages. A questionnaire is developed to evaluate the interactions. Then, a group of 30 ICT evaluated the interactions by assigning scores from 0 to 10, which indicate significance of an interaction.
The outputs of Q-analysis indicate that the most significant components, or the group with the highest priority, for developing an encryption system consists Human resources, R&D, Rules and regulations, ICT, and Standards components. These result is accordance with the GCI 2015, GCI 2017 and GCI 2018 reports issued by ITU.
http://servicio.bc.uc.edu.ve/ingenieria/revista/v27n1/art03.pdf (pdf)