2009
DOI: 10.7763/ijcte.2009.v1.49
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficiency of Encryption Schemes for Wireless Devices

Abstract: Encryption algorithms are known to be computationally intensive.They play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper tries to present a fair comparison between the most common and used algorithms in data encryption field according to power consumption. It provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
10
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 7 publications
3
10
0
Order By: Relevance
“…Analysis results are summarized in Table 7 shown bellow. • The obtained results seem to be sensible compared with the expected and the results obtained from [11] and [16]. • The overhead caused by applying DHKE protocol to the overall MANET performance is acceptable compared with its benefits especially for big data files, and was approximately 28% in term of processing time during algorithm procedures upon using a 2Kbits prime number.…”
Section: Discussionsupporting
confidence: 74%
See 1 more Smart Citation
“…Analysis results are summarized in Table 7 shown bellow. • The obtained results seem to be sensible compared with the expected and the results obtained from [11] and [16]. • The overhead caused by applying DHKE protocol to the overall MANET performance is acceptable compared with its benefits especially for big data files, and was approximately 28% in term of processing time during algorithm procedures upon using a 2Kbits prime number.…”
Section: Discussionsupporting
confidence: 74%
“…In our experiments the energy consumption was evaluated using the same technique described in [16]. We present a basic cost of encryption and decryption presented by the product of the total number of clock cycles taken by the encryption and the average current drawn by each CPU clock cycle.…”
Section: Energy Consumptionmentioning
confidence: 99%
“…Their result shows that frame based streaming perform best in term of bandwidth [2]. In August 2009, D. S.A. Elmina am with two more researchers have compared the different energy schemes over wireless devices on the basic of different sizes of data blocks, different data types, and finally also compared the encryption and decryption speed [3]. In March 2009, Elkilani, W.S.…”
Section: Figure1 Symmetric Key Encryption/decryption Methodsmentioning
confidence: 99%
“…These studies are based on experiments performed for different encryption algorithms, where the impact of the encryption parameters on the energy consumption is observed. In [4]- [6] the authors describe the effects of changing encryption factors that influence the overall security, with respect to energy consumption. Although such efforts are very interesting, as demonstrated in [3] there is an inherent need to develop global metrics for use in specifying the strength of encryption algorithms.…”
Section: Relevant Workmentioning
confidence: 99%