2013
DOI: 10.14257/ijsia.2013.7.5.01
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers

Abstract: In this paper we present empirical results obtained from Java implementation of Elliptic curve Cryptosystem (ECC) as an asymmetric block cipher algorithm and a set of symmetric block cipher algorithms namely Triple-Data Encryption Standard (T-DES), Advanced Encryption Standard (AES), and Blowfish. Performance evaluation based on CPU execution time is presented under WinXP and Linux.We used in our implementation Java programming language, Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Public key encryption has several benefits, including strong security protection against adversaries, providing digital signature and eradicating key distribution. However, the encryption/decryption processing speed is slow relative to that of symmetric encryption [54,55]. In this study, we do not use the RSA algorithm but rather AES and hashing algorithms are deployed to improve the security of MODBUS messaging during a communication broadcast.…”
Section: Security Bytesmentioning
confidence: 99%
“…Public key encryption has several benefits, including strong security protection against adversaries, providing digital signature and eradicating key distribution. However, the encryption/decryption processing speed is slow relative to that of symmetric encryption [54,55]. In this study, we do not use the RSA algorithm but rather AES and hashing algorithms are deployed to improve the security of MODBUS messaging during a communication broadcast.…”
Section: Security Bytesmentioning
confidence: 99%
“…Several techniques have been used to design the IDS. The intrusion detection policy proposed in [17] monitors the communication between neighboring nodes and finds those nodes that are not working normally. Some general rules are defined to detect such nodes, which are called compromised nodes.…”
Section: Introductionmentioning
confidence: 99%
“…We technically implement our algorithm and protocol considering the honeypots technique. In contrast to [17], we are not concerned with routing inside the WSN, but in addition to that work we propose a transport and policy algorithm and protocol. We do not inspect the traffic of the intruder (as [19] did) but we consider it to reduce the rate of attacks it can do.…”
Section: Introductionmentioning
confidence: 99%
“…DES is fast but less secure and AES is slow but more secure than DES [5], [6]. E-HATS incorporates the best features of both the algorithms.…”
Section: Introductionmentioning
confidence: 99%