4.1 Article

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

Journal

FUTURE INTERNET
Volume 3, Issue 1, Pages 31-48

Publisher

MDPI
DOI: 10.3390/fi3010031

Keywords

ubiquitous networks; performance; time delay; energy; cryptography; ARM architecture

Funding

  1. Spanish Ministry of Science and Innovation
  2. FEDER funds [TSI-020100-2009-374SAT2, TSI2007-65406-C03-03 E-AEGIS, CSD2007-00004 ARES]

Ask authors/readers for more resources

Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.1
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available