2018 21st International Conference of Computer and Information Technology (ICCIT) 2018
DOI: 10.1109/iccitechn.2018.8631957
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Cryptographic Algorithms for Selecting Better Utilization on Resource Constraint Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 24 publications
3
3
0
Order By: Relevance
“…Additionally, Haque et al [15] and Salama et al [32] reached the same conclusions, in which our findings also corroborate theirs. Namely, it was unsurprising that a smaller key size (128 bits) results in a quicker execution time for AES.…”
Section: Discussionsupporting
confidence: 92%
See 1 more Smart Citation
“…Additionally, Haque et al [15] and Salama et al [32] reached the same conclusions, in which our findings also corroborate theirs. Namely, it was unsurprising that a smaller key size (128 bits) results in a quicker execution time for AES.…”
Section: Discussionsupporting
confidence: 92%
“…Moreover, the results show that the Blowfish algorithm outperforms the DES algorithm in terms of speed and power consumption. Moreover, Haque et al [15] tested several algorithms with different parameters including data blocks, varying keys (128, 192, 256 bits) and file sizes. The basic concept behind performance testing is to identify the optimal algorithms for better utilization on resource constraint and mobile devices.…”
Section: Related Workmentioning
confidence: 99%
“…This finding in this study matches that of Haque et al's [17] study. However, Haque et al's [17] study was outperformed by implementing SHA-256 to achieve data integrity.…”
Section: Findings and Comparison With Existing Worksupporting
confidence: 94%
“…Signing the hash value of data with the use of hash functions, instead of signing the data directly provides a more efficient scheme for a digital signature because the hash of the data is a relatively smaller value compared to the original data, in accordance with Burr [10]. This finding in this study matches that of Haque et al's [17] study. However, Haque et al's [17] study was outperformed by implementing SHA-256 to achieve data integrity.…”
Section: Findings and Comparison With Existing Worksupporting
confidence: 88%
See 1 more Smart Citation