Crytographic primitives

From “Handbook of Applied Cryptography” – Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, the cryptographic primitives are:

  1. Level of security. Usually difficult to quantify. Often it’s given in terms of the number of operation required (using the best methods currently known) to defeat the intended objective.
  2. Functionality. Primitives wil need to be combined to meet various information security objectives.
  3. Methods of operation. Primitives, when applied in various way and with various inputs, will typically exhibit different characteristics; thus, one primitive could provide very different functionality depending on its mode of operation or usage.
  4. Performance. Refers to the efficiency of a primitive in particular mode of operation. (Example: an encryption algorithm may be rated by the number of bits per second which it can encrypt.)
  5. Ease of implementation. Refers to the difficulty of realizing the primitive in a practical instalation. This might include the complexity of implementing the primitive in either a software or hardware environment.

I will put these on my research proposal…