A Performance Analysis Model for Cryptographic Protocols

被引:0
|
作者
Olagunju, Amos [1 ]
Soenneker, Jake [1 ]
机构
[1] St Cloud State Univ, Comp Networking & Applicat Program, St Cloud, MN 56301 USA
关键词
Encryption algorithm; security; performance measurement; software engineering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the performance of DES, AES, 3DES, MD5, SHAT, and SHA2 encryption algorithms.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [21] CRYPTOBAP: A Binary Analysis Platform for Cryptographic Protocols
    Nasrabadi, Faezeh
    Kuennemann, Robert
    Nemati, Hamed
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1362 - 1376
  • [22] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [23] A Formal Analysis Method with Reasoning for Cryptographic Protocols
    Yan, Jingchen
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 566 - 570
  • [24] The modeling analysis of cryptographic protocols using Promela
    Xiao, Meihua
    Li, Jing
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4321 - +
  • [25] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
  • [26] On Formal Analysis of Cryptographic Protocols and Supporting Tool
    Xiao Meihua
    Jiang Yun
    Liu Qiaowei
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 223 - 228
  • [27] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, AP
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 83 - 89
  • [28] Formal model for cryptographic protocols based on planning theory
    Institute of Electronic Technique, Information Engineering University of PLA, Zhengzhou 450004, China
    Jisuanji Yanjiu yu Fazhan, 2008, 9 (1567-1577):
  • [29] An Advance Visual Model for Animating Behavior of Cryptographic Protocols
    Maeref, Mabroka Ali Mayouf
    Alghali, Fatma
    Abied, Khadija
    JOURNAL OF COMPUTERS, 2015, 10 (05) : 336 - 346
  • [30] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687