A Performance Analysis Model for Cryptographic Protocols

被引:0
|
作者
Olagunju, Amos [1 ]
Soenneker, Jake [1 ]
机构
[1] St Cloud State Univ, Comp Networking & Applicat Program, St Cloud, MN 56301 USA
关键词
Encryption algorithm; security; performance measurement; software engineering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the performance of DES, AES, 3DES, MD5, SHAT, and SHA2 encryption algorithms.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [41] Decidable analysis of cryptographic protocols with products and modular exponentiation
    Shmatikov, V
    PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 355 - 369
  • [42] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
    Pankova, Alisa
    Laud, Peeter
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
  • [43] A problem solving mechanism for formal analysis of cryptographic Protocols
    Han, Jihong
    Zhao, Yu
    Wang, Yadi
    Zhou, Zhiyong
    NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 95 - 98
  • [44] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, David
    Proceedings of the Computer Security Foundations Workshop, 1999, : 44 - 54
  • [45] Automata-based analysis of recursive cryptographic protocols
    Küsters, R
    Wilke, T
    STACS 2004, PROCEEDINGS, 2004, 2996 : 382 - 393
  • [46] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [47] Cooperative Model Reconstruction for Cryptographic Protocols Using Visual Languages
    Weyers, Benjamin
    Luther, Wolfram
    Baloian, Nelson
    GROUPWARE-DESIGN: IMPLEMENTATION, AND USE, PROCEEDINGS, 2009, 5784 : 311 - +
  • [48] An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets
    Wei, Jin
    Su, Guiping
    Xu, Meng
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 457 - 460
  • [49] Infinite state AMC-model checking for cryptographic protocols
    Kaehler, Detlef
    Kuesters, Ralf
    Truderung, Tomasz
    22ND ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2007, : 181 - +
  • [50] On using probabilistic Turing machines to model participants in cryptographic protocols
    Klingler, Lee
    Steinwandt, Rainer
    Unruh, Dominique
    THEORETICAL COMPUTER SCIENCE, 2013, 501 : 49 - 51