Asafsdfadsf

Only available on StudyMode
  • Topic: Advanced Encryption Standard, Cryptography, Encryption
  • Pages : 11 (3457 words )
  • Download(s) : 22
  • Published : March 21, 2013
Open Document
Text Preview
International Journal of Network Security, Vol.10, No.3, PP.216–222, May 2010

216

Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam1 , Hatem Mohamed Abdual Kader2 , and Mohiy Mohamed Hadhoud2 (Corresponding author: Diaa Salama Abd Elminaam)

Higher Technological Institute 10th of Ramadan City, Egypt1 Faculty of Computers and Information Minufiya University, Egypt2 (Email: {ds desert, hatem6803, mmhadhoud}@yahoo.com (Received Feb. 16, 2009; revised and accepted May 12, 2009)

Abstract

bits keys [2, 3, 4, 5, 9, 10, 11, 13]. The most common classification of encryption techniques can be shown in Internet and networks applications are growing very fast, Figure 1. so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms conCryptography sume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption Protocols Public-key Private-key algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for RSA& Others each algorithm such as different sizes of data blocks, difBlock Stream ferent data types, battery power consumption, different key size and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness RC4& Others of each algorithm. AES BlowFish &Others RC6 Keywords: 3DES, AES, blowfish, computer security, DES, encryption techniques, RC2, RC6 Figure 1: Overview of the field of cryptography

1

Introduction

Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) keys encryption. In Symmetric keys encryption or secret key encryption, only one key is used to encrypt and decrypt data. In Asymmetric keys, two keys are used; private and public keys. Public key is used for encryption and private key is used for decryption (e.g. RSA and ECC). Public key encryption is based on mathematical functions, computationally intensive and is not very efficient for small mobile devices [5, 10]. There are many examples of strong and weak keys of cryptography algorithms like RC2, DES, 3DES, RC6, Blowfish, and AES. RC2 uses one 64-bit key. DES uses one 64-bits key. Triple DES (3DES) uses three 64-bits keys while AES uses various (128,192,256) bits keys. Blowfish uses various (32-448); default 128bits while RC6 is used various (128,192,256)

This paper examines a method for evaluating performance of selected symmetric encryption of various algorithms. Encryption algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. Battery power is subjected to the problem of energy consumption due to encryption algorithms. Battery technology is increasing at a slower rate than other technologies. This causes a “battery gap” [1, 8]. We need a way to make decisions about energy consumption and security to reduce the consumption of battery powered devices. This study evaluates six different encryption algorithms namely; AES, DES, 3DES, RC6, Blowfish, and RC2. The performance measure of encryption schemes will be conducted in terms of energy, changing data types - such as text or document, Audio data and video datapower consumption, changing packet size and changing key size for the selected cryptographic algorithms.

International Journal of Network Security, Vol.10, No.3, PP.216–222, May 2010

217

2

Related Work

To give more prospective about the performance of the compared algorithms, this section discusses the results obtained from other resources. It was shown in [10] that energy consumption of different common symmetric key encryptions on hand held devices. It is found that after only 600 encryptions of a 5 MB file using...
tracking img