A Performance Analysis Model for Cryptographic Protocols

被引:0
|
作者
Olagunju, Amos [1 ]
Soenneker, Jake [1 ]
机构
[1] St Cloud State Univ, Comp Networking & Applicat Program, St Cloud, MN 56301 USA
关键词
Encryption algorithm; security; performance measurement; software engineering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the performance of DES, AES, 3DES, MD5, SHAT, and SHA2 encryption algorithms.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [1] Performance analysis of cryptographic protocols on handheld devices
    Argyroudis, PG
    Verma, R
    Tewari, H
    O'Mahony, D
    THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
  • [2] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [3] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [4] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [5] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [6] Using SPIN to model cryptographic protocols
    Li, YJ
    Xue, R
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 741 - 745
  • [7] The Model Reasoning Verifier for cryptographic protocols
    Liu, YW
    Li, WQ
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 290 - 295
  • [8] A Logic to Model Time in Cryptographic Protocols
    Lei Xinfeng
    Liu Jun
    Xiao Jumno
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 399 - 403
  • [9] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
  • [10] Cryptographic Protocols Analysis in Event B
    Benaissa, Nazim
    Mery, Dominique
    PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +