A Performance Analysis Model for Cryptographic Protocols

被引:0
|
作者
Olagunju, Amos [1 ]
Soenneker, Jake [1 ]
机构
[1] St Cloud State Univ, Comp Networking & Applicat Program, St Cloud, MN 56301 USA
关键词
Encryption algorithm; security; performance measurement; software engineering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the performance of DES, AES, 3DES, MD5, SHAT, and SHA2 encryption algorithms.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [11] Non interference for the analysis of cryptographic protocols
    Focardi, R
    Gorrieri, R
    Martinelli, F
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
  • [12] A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
    Brlek, Srecko
    Hamadou, Sardaouna
    Mullins, John
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 194 (01) : 61 - 83
  • [13] CVS: a compiler for the analysis of cryptographic protocols
    Durante, A
    Focardi, R
    Gorrieri, R
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212
  • [14] New analysis method of cryptographic protocols
    Qian, Y.
    Zhang, Y.
    Bai, Y.C.
    Jisuanji Gongcheng/Computer Engineering, 2001, 27 (03):
  • [15] Design and analysis of cryptographic protocols for RFID
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Xuebao, 2006, 4 (581-589):
  • [16] Model-based testing of cryptographic protocols
    Rosenzweig, D
    Runje, D
    Schulte, W
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 33 - 60
  • [17] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, Alfred P.
    Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89
  • [18] Key substitution in the symbolic analysis of cryptographic protocols
    Chevalier, Yannick
    Kourjieh, Mounira
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 121 - 132
  • [19] Transducer-based analysis of cryptographic protocols
    Kuesters, Ralf
    Wilke, Thomas
    INFORMATION AND COMPUTATION, 2007, 205 (12) : 1741 - 1776
  • [20] Cryptographic Protocols' Performance and Network Layer Security of RSMAD
    Sokol, Marcin
    Gajewski, Slawomir
    Gajewska, Malgorzata
    2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13