Performance analysis of encryption algorithms on mobile devices
- 1 October 2013
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2013 47th International Carnahan Conference on Security Technology (ICCST)
Abstract
Currently communications through mobile devices are necessary, but use of these is restricted due to the presence of attacks on communications. The encrypted authentication and data encryption are techniques to protect against such threats. Among the different types of encryption algorithms that exist, some are unsafe and additionally may require high computational costs, this also causes the communications not to be carried out at the appropriate times and sometimes the session establishing process fails. This paper shows a strategy that allows an analysis of the most common and safe encryption algorithms, specifically Rijndael (Advanced Encryption Standard-AES), SERPENT and TWOFISH, in order to establish which one of these is the most optimum to be implemented in smartphones and tablets; additionally other algorithms are relate, which are used commonly in many applications, tests are carried out over mobiles devices, which measure the performance and computational cost of the devices when they run each algorithm.Keywords
This publication has 12 references indexed in Scilit:
- Improving confidentiality of AES-CCMP in IEEE 802.11iPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Enhancing security and confidentiality on mobile devices by location-based data encryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- The Implementation of FPGA-based RSA Public-key Algorithm and its Application in Mobile-phone SMS Encryption SystemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Secure smart phones fitted to mobile Ad hoc networks and devices for security controlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Performance Comparison of Advanced Encryption Standard (AES) and AES Key Dependent S-Box - Simulation Using MATLABPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Improved user authentication in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Person authentication using face, teeth and voice modalities for mobile device securityIEEE Transactions on Consumer Electronics, 2010
- Online Banking Authentication Using Mobile PhonesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004