Replication Package: Toward a Common Understanding of Cryptographic Agility – A Systematic Review

Citation Author(s):
Christian
Näther
XITASO GmbH
Submitted by:
Christian Naether
Last updated:
Sat, 02/08/2025 - 12:48
DOI:
10.21227/95kk-n747
Links:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

This is the replication package of our paper entitled “Toward a Common Understanding of Cryptographic Agility - A Systematic Review”.

Abstract of the paper:

Cryptographic agility is gaining attention due to its crucial role in maintaining cryptographic security in a rapidly evolving technological landscape. However, despite its increasing importance, the term cryptographic agility remains vaguely defined and there is no clear consensus on its exact meaning.
This lack of clarity poses a challenge since the need for agility becomes more urgent as new cryptographic vulnerabilities and advanced computing threats emerge, emphasizing the need for a systematic approach to clarify and refine the notion on cryptographic agility.

In this paper, we systematize the concept of cryptographic agility by providing three research contributions.
First, we review current definitions across academic and gray literature, identifying six distinct categories to differentiate every aspect within the definitions.
Second, we synthesize these insights to establish a comprehensive, canonical definition of cryptographic agility.
Third, we explore the relationship between cryptographic agility and the related concepts cryptographic versatility and interoperability.

In our discussion, we examine the relevance of cryptographic agility, highlight its trade-offs with complexity, assess its individual applicability, and illustrate its various contexts by offering an additional application-specific definition.

Our work provides a new perspective on cryptographic agility and related concepts, based on systematical research to clarify and enhance its future use.

Instructions: 

Our replication package consists of the following two files:

1. README.md (this file)

2. cryptographic_agility_replication_package.xlsx (contains all the content)

For the sake of simplicity, we have chosen this one xlsx file to be able to reproduce our findings and conclusions.

 

Replication Package Content

Our file cryptographic_agility_replication_package.xlsx contains the following excel sheets: 

1. Search Strings

2. Papers and Definitions

3. Statistics 

4. Selected Papers with Categories

5. Synthesis

6. Mapping Table for Synthesis

Each of these will be explained in the following in more detail.

 

1. Search Strings

For our search process we used one unique search string for Google Scholar and one unique search string for Google Search. 

 

 2. Papers and Definitions

This excel sheet contains 70 different papers that at first glance seem promising for a suitable definition of cryptographic agility. 

We also assessd the definition(s) of each paper in regards to:

- Duplicated definition

- No definition

- Proper definition (paper was selected for further processing)

- Definition only refers to an already existing cryptographic agility definition without contributing to a new/ own definition

Finally, 37 papers were included in the final paper set.

 

3. Statistics 

This sheet contains the descriptive statistics of our research.

 

4. Selected Papers with Categories

In this sheet, we evaluated each aspect of the final paper set definitions in regards to our 6 distinct categories: 

- Context

- Modes

- Desired Capabilities

- Quality Attributes

- Technical Assets

- Drivers

 

5. Synthesis 

In our synthesis we further mapped the results of 4. in order to achieve unique values for each category. 

 

6. Mapping Table for Synthesis

The mapping table was used for our synthesis in order to have a clear assignment. 

Funding Agency: 
Bundesministerium für Bildung und Forschung