Md. Enamul Haque, S. Zobaed, Muhammad Usama Islam, Faaiza Mohammad Areef
{"title":"在资源约束设备上选择更好利用的加密算法的性能分析","authors":"Md. Enamul Haque, S. Zobaed, Muhammad Usama Islam, Faaiza Mohammad Areef","doi":"10.1109/ICCITECHN.2018.8631957","DOIUrl":null,"url":null,"abstract":"In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource constraint and mobile devices. We focus on AES, RC4, Blowfish, CAST, 3DES, Twofish as symmetric key encryption and DSA and ElGamal as an asymmetric encryption algorithms. The performance is compared using different parameters such as key size, data blocks, data types, and encryption/decryption speed. The experiments are performed to exploit the effectiveness of different cryptographic algorithms to use in real life applications where fast execution time and less memory usage requirement is of prime importance.","PeriodicalId":355984,"journal":{"name":"2018 21st International Conference of Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Performance Analysis of Cryptographic Algorithms for Selecting Better Utilization on Resource Constraint Devices\",\"authors\":\"Md. Enamul Haque, S. Zobaed, Muhammad Usama Islam, Faaiza Mohammad Areef\",\"doi\":\"10.1109/ICCITECHN.2018.8631957\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource constraint and mobile devices. We focus on AES, RC4, Blowfish, CAST, 3DES, Twofish as symmetric key encryption and DSA and ElGamal as an asymmetric encryption algorithms. The performance is compared using different parameters such as key size, data blocks, data types, and encryption/decryption speed. The experiments are performed to exploit the effectiveness of different cryptographic algorithms to use in real life applications where fast execution time and less memory usage requirement is of prime importance.\",\"PeriodicalId\":355984,\"journal\":{\"name\":\"2018 21st International Conference of Computer and Information Technology (ICCIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 21st International Conference of Computer and Information Technology (ICCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCITECHN.2018.8631957\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st International Conference of Computer and Information Technology (ICCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCITECHN.2018.8631957","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Analysis of Cryptographic Algorithms for Selecting Better Utilization on Resource Constraint Devices
In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource constraint and mobile devices. We focus on AES, RC4, Blowfish, CAST, 3DES, Twofish as symmetric key encryption and DSA and ElGamal as an asymmetric encryption algorithms. The performance is compared using different parameters such as key size, data blocks, data types, and encryption/decryption speed. The experiments are performed to exploit the effectiveness of different cryptographic algorithms to use in real life applications where fast execution time and less memory usage requirement is of prime importance.