Analysis of Cryptographic Libraries(SSL/TLS)

Authors

  • Prasad Kannojia S Department of Computer Science, University of Lucknow, Lucknow, India
  • Kurmi J Department of Computer Science, University of Lucknow, Lucknow, India

DOI:

https://doi.org/10.26438/ijcse/v9i9.5962

Keywords:

Thread Safet, TLS, AES-NI

Abstract

Secure communication in Computer Network is very important which can be achieved by Transport Layer Security (TLS) protocol. Various libraries have been created for the implementation of TLS functions by the researchers, of which each has wide support of the encryption algorithms, key exchange mechanism from which one can implement TLS for secure communications. In this paper, to find the best suitable SSL/TLS library, relative analysis of the six widely used libraries has been done based on various affecting parameter such Languages, Cryptographic Token Interface - PKCS#11, Thread Safety, and CPU Assisted Cryptography with AES-NI. Any organization can use an effective and efficient library that will provide the appropriate security and fulfill the expectation of the application.

References

[1] E. Rescorla, and N. Modadugu. "Datagram transport layer security version 1.2." 2012.

[2] Mozilla Developer Network, "Network Security Services", Aug 10, 2021.https://developer.mozilla.org/enUS/docs/Mozilla/Projects/NSS#Documentation.

[3] OpenSSL, Cryptography and SSL/TLS Toolkit - Threads, 1.0.2 manpages, 10 August 2021 https://www.openssl.org/docs/man1.0.2/crypto/threads.html

[4] GnuTLS, Transport Layer Security Library for the GNU system, for version 3.7.1, March 2021. https://www.gnutls.org/manual/gnutls.html

[5] Gutmann, Peter, "Downloading", cryptlib, University of Auckland School of Computer Science, 07 July 2021

[6] Google. "BoringSSL." Google, 29 July 2021. https://boringssl.googlesource.com/boringssl/

[7] A. Chudnov, N. Collins, B. Cook, J. Dodds, B. Huffman, C. MacCárthaigh, S. Magill, "Continuous formal verification of Amazon s2n", In International Conference on Computer Aided Verification, pp. 430-446, Oxford, UK, 2018.

[8] B. Bond, C. Hawblitzel, M. Kapritsos, K. R. M. Leino, J. R. Lorch, B. Parno, A. Rane, S. Setty, and L. Thompson, "Vale: Verifying high-performance cryptographic assembly code", In 26th {USENIX} Security Symposium ({USENIX} Security 17), pp. 917-934, VANCOUVER, BC, CANADA 2017.

[9] Fromherz, Aymeric, N. Giannarakis, C. Hawblitzel, B. Parno, A. Rastogi, and N. Swamy, "A verified, efficient embedding of a verifiable assembly language", Proceedings of the ACM on Programming Languages 3, pp. 1-30, New York, United States, 2019

[10] T. Bingmann, "Speedtest and comparsion of open-source cryptography libraries and compiler flags", Timo Bingmann–2008. https://panthema. net/2008/0714-cryptography-speedtest-comparison (2008), 2018.

[11] J.K Zinzindohoué, K. Bhargavan, J. Protzenko, and B. Beurdouche, "HACL*: A verified modern cryptographic library", In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1789-1806,New York, United States 2017.

[12] J. P. Lim, and S. Nagarakatte, "Automatic equivalence checking for assembly implementations of cryptography libraries", In 2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), pp. 37-49, Washington, DC, USA, 2019.

[13] A. Erbsen, J. Philipoom, J. Gross, R. Sloan, and A. Chlipala, "Simple high-level code for cryptographic arithmetic-with proofs, without compromises", In 2019 IEEE Symposium on Security and Privacy (SP), pp. 1202-1219, San Francisco, CA, USA , 2019.

[14] V. Gopal, J. Guilford, E. Ozturk, S. Gulley, W. Feghali, “Improving OpenSSL* Performance”, in IA Architects Intel Corporation, October 2011, https://software.intel.com/sites/default/files/open-sslperformance-paper.pdf

[15] B. Boston, S. Breese, J. Dodds, M. Dodds, B. Huffman, A. Petcher, and A. Stefanescu, "Verified Cryptographic Code for Everybody", In International Conference on Computer Aided Verification, pp. 645-668, Springer, Cham, 2021.

Downloads

Published

2021-09-30
CITATION
DOI: 10.26438/ijcse/v9i9.5962
Published: 2021-09-30

How to Cite

[1]
S. Prasad Kannojia and J. Kurmi, “Analysis of Cryptographic Libraries(SSL/TLS)”, Int. J. Comp. Sci. Eng., vol. 9, no. 9, pp. 59–62, Sep. 2021.

Issue

Section

Research Article