{"title":"在移动设备中使用加密算法的功耗研究","authors":"Jiehong Wu, Ilia Detchenkov, Yang Cao","doi":"10.1109/ICSESS.2016.7883224","DOIUrl":null,"url":null,"abstract":"Mobile Ad Hoc network is rapidly developing research area, one of the open question in this area is secure data inside the network. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of three of the common encryption algorithms: AES, Blowfish, and GOST. A comparison has been conducted for those encryption algorithms at different sizes of data blocks. Key expansion time and encryption/decryption speed was measured. Simulation results are given to demonstrate the effectiveness of each algorithm.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A study on the power consumption of using cryptography algorithms in mobile devices\",\"authors\":\"Jiehong Wu, Ilia Detchenkov, Yang Cao\",\"doi\":\"10.1109/ICSESS.2016.7883224\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Ad Hoc network is rapidly developing research area, one of the open question in this area is secure data inside the network. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of three of the common encryption algorithms: AES, Blowfish, and GOST. A comparison has been conducted for those encryption algorithms at different sizes of data blocks. Key expansion time and encryption/decryption speed was measured. Simulation results are given to demonstrate the effectiveness of each algorithm.\",\"PeriodicalId\":175933,\"journal\":{\"name\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS.2016.7883224\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2016.7883224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A study on the power consumption of using cryptography algorithms in mobile devices
Mobile Ad Hoc network is rapidly developing research area, one of the open question in this area is secure data inside the network. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of three of the common encryption algorithms: AES, Blowfish, and GOST. A comparison has been conducted for those encryption algorithms at different sizes of data blocks. Key expansion time and encryption/decryption speed was measured. Simulation results are given to demonstrate the effectiveness of each algorithm.