Performance characteristics of Itanium/sup TM/ processor on data encryption algorithms

Author(s):  
T.H. Bui
2021 ◽  
Vol 50 (4) ◽  
pp. 786-807
Author(s):  
Alen Salkanovic ◽  
Sandi Ljubic ◽  
Ljubisa Stankovic ◽  
Jonatan Lerga

This paper evaluates the performances of numerous encryption algorithms on mobile devices running the Android operating system. The primary objective of our research was to measure and compare the relative performances of tested algorithm implementations (Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES), ChaCha20, Blowfish, and Rivest Cipher 4 (RC4)) on the Android platform. The algorithms were compared in terms of CPU utilization by measuring the time required to encrypt and decrypt variable size text files. Besides evaluating the six common symmetric encryption ciphers, a comparison has been conducted for several Password-Based Encryption (PBE) algorithms. Diverse cipher transformations were evaluated for each algorithm by utilizing various feedback modes and padding schemes. Two smartphone devices were used for testing, with different versions of the Android operating system and hardware specifications. The summarized performance outcomes for various cipher transformations are presented to demonstrate the effectiveness of each algorithm.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Bahman A. Sassani (Sarrafpour) ◽  
Mohammed Alkorbi ◽  
Noreen Jamil ◽  
M. Asif Naeem ◽  
Farhaan Mirza

Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.


2018 ◽  
Vol 21 ◽  
pp. 00011
Author(s):  
Dariusz Strzęciwilk ◽  
Krzysztof Ptaszek ◽  
Paweł Hoser ◽  
Izabella Antoniku

The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network. A network model supporting data encryption using the AES algorithm and the MD5 and SHA hash functions used in VPN tunnels was designed and tested. The influence of different data length on the quality of transmission in a secured network was studied. The measurements and tests of networks were performed according to two methodologies ITU-T Y.1564 and RFC 2544. The impact of the data encryption mechanism on bandwidth, data loss and maximum delays was examined. The secured network tests were performed with different combinations of encryption algorithms and hash functions of the VPN tunnel in the ESP (Encapsulating Security Payload) transport mode.


Author(s):  
G. Renuka ◽  
V. Usha Shree ◽  
P. Chandra Sekhar Reddy

Encryption algorithms play a dominant role in preventing unauthorized access to important data. This paper focus on the implementations of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms on Microblaze soft core Processor and also their implementations on XC6VLX240t FPGA using Verilog Hardware Description language. This paper also gives a comparison of the issues related to the hardware and software implementations of the two cryptographic algorithms.


2018 ◽  
Vol 7 (09) ◽  
pp. 24311-24318
Author(s):  
Rajesh Kannan ◽  
Dr. R. Mala

with the rapid increase of technology, the data stored and transmitted among the client and server has been increased tremendously. In order to provide high security for the confidential data, there is a need for proper encryption techniques that are to be followed by the concerns. This paper presents an analysis of the various encryption algorithms and their performance on handling the private data with authentication, access control, secure configuration and data encryption. Document oriented databases such as MongoDB, Cassandra, CouchDB, Redis and Hypertable are compared on the basis of their security aspects since they manipulate the huge amount of unstructured data in their databases. It is proposed that each database has its own security breaches and emphasises the need for proper encryption methods to secure the data stored in them. 


Author(s):  
Zainab Khyioon Abdalrdha ◽  
Iman Hussein AL-Qinani ◽  
Farah Neamah Abbas

The importance of encryption in most organizations, therefore, it became necessary to encrypt data because data security is an essential component in order to maintain the security of data and information in various institutions. Encryption also helps to ensure the confidentiality and integrity of data during transmission through communication channels. Given the importance of the keys used in encryption as a key part in the strength of the algorithm and increase its security in most encryption algorithms, thus generating the key in many research the most important part in data encryption and its importance lies in the non-duplication of keys to ensure better results and theoretically impossible to break. In this paper, we try to describe and review many of the papers that were used to create the keys and compare them with each other.


Author(s):  
Nabilah Hani Abughazalah ◽  
Majid Khan

In this age of internet communication, the security of digital information is one of the main issues. The privacy of data depends upon the encryption using some secure algorithm. The selection of robust cryptosystems to ensure confidentiality is a major concern to decrease the risk of cryptographic attacks. In this article, we have implemented a grey theory-based decision-making technique for the election of a robust cryptosystem that complies with all the cryptographic parameters. Six different already proposed encryption algorithms are selected as the alternatives of the decision-making problem and the parameters concerned for the decision are entropy, correlation coefficient, the number of pixels changing rate (NPCR), unified average changing intensity (UACI). The algorithm ranked as first by using grey-based decision-making method can be utilized for secure data encryption.


Sign in / Sign up

Export Citation Format

Share Document