A Performance Analysis Model for Cryptographic Protocols

被引:0
|
作者
Olagunju, Amos [1 ]
Soenneker, Jake [1 ]
机构
[1] St Cloud State Univ, Comp Networking & Applicat Program, St Cloud, MN 56301 USA
关键词
Encryption algorithm; security; performance measurement; software engineering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the performance of DES, AES, 3DES, MD5, SHAT, and SHA2 encryption algorithms.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [31] Cryptography and cryptographic protocols
    Goldreich, O
    DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [32] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [33] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [34] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [35] Process algebraic frameworks for the specification and analysis of cryptographic protocols
    Gorrieri, R
    Martinelli, F
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 46 - 67
  • [36] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks
    Samanth, Snehal
    Prema, K. V.
    Balachandra, Mamatha
    IEEE ACCESS, 2024, 12 : 183792 - 183808
  • [37] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, D
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 44 - 54
  • [38] A survey on computationally sound formal analysis of cryptographic protocols
    Lei, Xin-Feng
    Song, Shu-Min
    Liu, Wei-Bing
    Xue, Rui
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016
  • [39] Automated analysis of cryptographic protocols using Mur phi
    Mitchell, JC
    Mitchell, M
    Stern, U
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 141 - 151
  • [40] Tools for cryptographic protocols analysis: A technical and experimental comparison
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Sisto, Riccardo
    Valenzano, Adriano
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 954 - 961