Visible to the public Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process

TitleOptimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Publication TypeConference Paper
Year of Publication2019
AuthorsQiu, J., Lu, X., Lin, J.
Conference Name2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)
KeywordsAES, analytic hierarchy process, asymmetric cryptographic algorithms, blockchain, Computational efficiency, cryptocurrencies, cryptographic algorithms, cryptography, data privacy, Distributed databases, ECDSA, experts grading method, FAHP, financial data processing, fuzzy analytic hierarchy process, Fuzzy Cryptography, fuzzy set theory, Hardware, Metrics, pubcrawl, Resiliency, Scalability, security, SHA256, suitable cryptographic algorithm, symmetric cryptographic algorithms
AbstractAs a collection of innovative technologies, blockchain has solved the problem of reliable transmission and exchange of information on untrusted networks. The underlying implementation is the basis for the reliability of blockchain, which consists of various cryptographic algorithms for the use of identity authentication and privacy protection of distributed ledgers. The cryptographic algorithm plays a vital role in the blockchain, which guarantees the confidentiality, integrity, verifiability and non-repudiation of the blockchain. In order to get the most suitable cryptographic algorithm for the blockchain system, this paper proposed a method using Fuzzy Analytic Hierarchy Process (FAHP) to evaluate and score the comprehensive performance of the three types of cryptographic algorithms applied in the blockchain, including symmetric cryptographic algorithms, asymmetric cryptographic algorithms and hash algorithms. This paper weighs the performance differences of cryptographic algorithms considering the aspects of security, operational efficiency, language and hardware support and resource consumption. Finally, three cryptographic algorithms are selected that are considered to be the most suitable ones for block-chain systems, namely ECDSA, sha256 and AES. This result is also consistent with the most commonly used cryptographic algorithms in the current blockchain development direction. Therefore, the reliability and practicability of the algorithm evaluation pro-posed in this paper has been proved.
DOI10.1109/CCOMS.2019.8821757
Citation Keyqiu_optimal_2019