Abstract

This paper evaluates the performances of numerous encryption algorithms on mobile devices running the Android operating system. The primary objective of our research was to measure and compare the relative performances of tested algorithm implementations (Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES), ChaCha20, Blowfish, and Rivest Cipher 4 (RC4)) on the Android platform. The algorithms were compared in terms of CPU utilization by measuring the time required to encrypt and decrypt variable size text files. Besides evaluating the six common symmetric encryption ciphers, a comparison has been conducted for several Password-Based Encryption (PBE) algorithms. Diverse cipher transformations were evaluated for each algorithm by utilizing various feedback modes and padding schemes. Two smartphone devices were used for testing, with different versions of the Android operating system and hardware specifications. The summarized performance outcomes for various cipher transformations are presented to demonstrate the effectiveness of each algorithm.

Highlights

  • Cryptography includes procedures employed for keeping private information safe while storing and transmitting data

  • CPU utilization is defined as the time needed to encrypt and decrypt the documents stored on the internal memory of a device

  • In case when Cipher block chaining (CBC) or Electronic codebook (ECB) modes are combined with the ISO10126Padding, more time is required for the complete process

Read more

Summary

Introduction

Cryptography (encryption and decryption) includes procedures employed for keeping private information safe while storing and transmitting data. Its primary purposes are to protect sensitive data from unauthorized persons and exchange information over a public channel. Encryption ciphers can be divided into two categories: symmetric key and asymmetric key encryption. In symmetric-key ciphers, both sender and receiver use the same private key (used for encryption and decryption). This means that the key must be exchanged between them using some trustworthy procedure. This approach requires a new key for each pair of persons who communicate over a public channel

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.