Md. Enamul Haque, S. Zobaed, Muhammad Usama Islam, Faaiza Mohammad Areef
{"title":"Performance Analysis of Cryptographic Algorithms for Selecting Better Utilization on Resource Constraint Devices","authors":"Md. Enamul Haque, S. Zobaed, Muhammad Usama Islam, Faaiza Mohammad Areef","doi":"10.1109/ICCITECHN.2018.8631957","DOIUrl":null,"url":null,"abstract":"In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource constraint and mobile devices. We focus on AES, RC4, Blowfish, CAST, 3DES, Twofish as symmetric key encryption and DSA and ElGamal as an asymmetric encryption algorithms. The performance is compared using different parameters such as key size, data blocks, data types, and encryption/decryption speed. The experiments are performed to exploit the effectiveness of different cryptographic algorithms to use in real life applications where fast execution time and less memory usage requirement is of prime importance.","PeriodicalId":355984,"journal":{"name":"2018 21st International Conference of Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st International Conference of Computer and Information Technology (ICCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCITECHN.2018.8631957","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource constraint and mobile devices. We focus on AES, RC4, Blowfish, CAST, 3DES, Twofish as symmetric key encryption and DSA and ElGamal as an asymmetric encryption algorithms. The performance is compared using different parameters such as key size, data blocks, data types, and encryption/decryption speed. The experiments are performed to exploit the effectiveness of different cryptographic algorithms to use in real life applications where fast execution time and less memory usage requirement is of prime importance.