General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2009 Vol.1(3): 302-309 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2009.V1.49

Energy Efficiency of Encryption Schemes for Wireless Devices

Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud

Abstract—Encryption algorithms are known to be computationally intensive. They play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper tries to present a fair comparison between the most common and used algorithms in data encryption field according to power consumption. It provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.

Index Terms—Encryption techniques, Computer security, AES, DES, RC2, 3DES, Blowfish, RC6

[PDF]

Cite: Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, "Energy Efficiency of Encryption Schemes for Wireless Devices," International Journal of Computer Theory and Engineering vol. 1, no. 3, pp. 302-309, 2009.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.