Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
           Alle artikelen van de bijbehorende aflevering
                                       Details van artikel 1 van 1 gevonden artikelen
  Studying the Effects of Most Common Encryption Algorithms
Titel: Studying the Effects of Most Common Encryption Algorithms
Auteur: Diaa Salama
Hatem Abdual Kader
Mohiy Hadhoud
Verschenen in: International Arab journal of e-technology
Paginering: Jaargang 2 (2011) nr. 1 pagina's 1-10
Jaar: 2011
Inhoud: Wireless networks play critical roles in present work, home, and public places, so the needs of protecting of suchnetworks are increased. Encryption algorithms play vital roles in information systems security. Those algorithms consume asignificant amount of computing resources such as CPU time, memory, and battery power. CPU and memory usability areincreasing with a suitable rates, but battery technology is increasing at slower rate. The problem of the slower increasingbattery technology forms “battery gap”. The design of efficient secure protocols for wireless devices from the view of batteryconsumption needs to understand how encryption techniques affect the consumption of battery power with and without datatransmission. This paper studies the effects of six of the most common symmetric encryption algorithms on power consumptionfor wireless devices. at different settings for each algorithm. These setting include different sizes of data blocks, different datatypes (text, images, and audio file), battery power consumption, different key size, different cases of transmission of the data ,effect of varying signal to noise ratio and finally encryption/decryption speed. The experimental results show the superiority oftwo encryption algorithm over other algorithms in terms of the power consumption, processing time, and throughput .Theseresults can aid in new design of security protocol where energy efficiency is the main focus. Some suggestions for design ofsecure communications systems to handle the varying wireless environment have been provided to reduce the energyconsumption of security protocols.
Uitgever: Arab Open University (provided by DOAJ)
Bronbestand: Elektronische Wetenschappelijke Tijdschriften

                             Details van artikel 1 van 1 gevonden artikelen
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland