About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

Research Article

Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-17081-2_10,
        author={Haoling Fan and Lingjia Meng and Fangyu Zheng and Mingyu Wang and Bowen Xu},
        title={Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics},
        proceedings={Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings},
        proceedings_a={AC3},
        year={2022},
        month={10},
        keywords={Black-box testing Data characteristics Algorithm identification},
        doi={10.1007/978-3-031-17081-2_10}
    }
    
  • Haoling Fan
    Lingjia Meng
    Fangyu Zheng
    Mingyu Wang
    Bowen Xu
    Year: 2022
    Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics
    AC3
    Springer
    DOI: 10.1007/978-3-031-17081-2_10
Haoling Fan1, Lingjia Meng1, Fangyu Zheng1,*, Mingyu Wang1, Bowen Xu1
  • 1: State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
*Contact email: zhengfangyu@iie.ac.cn

Abstract

Serving communications security, identity authentication, etc., cryptographic algorithms constitute the cornerstone of cyberspace security. During the past decades, cryptanalysts have proved that many once prevailing cryptographic algorithms (e.g., MD4, MD5, 3DES, RC4) are no longer secure now. However, insecure cryptographic algorithms are still widely deployed in practice, seriously endangering the security of cyberspace. The reasons for this dilemma are many-fold, one of which is difficult to detect the algorithms used in the legacy binaries. Most of the existing detecting methods of cryptographic algorithms, either require source code analysis (i.e., white-box testing) or depend on the dynamic execution information (i.e., dynamic testing), narrowing the testing scope where the source codes of commercial software are not provided and the running environment may be difficult to deploy. In this paper, we propose a method of static black-box testing of cryptographic algorithms, which can identify a specific algorithm based on the corresponding data characteristics. We have implemented the testing method and used it to check 150 binaries of three types, including cryptographic libraries, commonly-used programs that use cryptographic algorithms, and general-purpose Github projects without cryptographic algorithms. The empirical results demonstrate that 80.6% of the insecure cryptographic algorithm are implemented in the test files that contain the cryptographic algorithms. The false negative rate and false positive rate were 2.10% and 1.68% using our method. Moreover, we found that the insecure cryptographic algorithms (i.e., MD4, SHA-1) is still exist in some popular software, e.g., MbedTLS and 7-Zip.

Keywords
Black-box testing Data characteristics Algorithm identification
Published
2022-10-06
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-17081-2_10
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL