General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2009 Vol.1(3): 318-324 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2009.V1.51

Measuring and Reducing Energy Consumptionof Cryptographic Schemes for Different Data Types

Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud

Abstract—Security can be provided at different levels using different settings with different security algorithms, which can consume different levels of energy. The security settings can be different in many factors, but the main factors are the choice of ciphers used to provide security functions, the key length, and the number of operational rounds, packet size, and data types. These factors also have a significant impact on the energy consumption for providing security. A security algorithm is a function that is commonly used to provide security services such as encryption and message authentication. Many ciphers have been created, but only few are known to be strong and secure, which means no loophole or backdoor is known. The study of the energy consumption of the encryption schemes in wireless devices is essential in design of energy efficient security protocols. The major contributions of this paper are energy-security trades off then, some suggestions for design of secure communications systems. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed.

Index Terms—Encryption techniques, Computer security, AES, DES, RC2, 3DES, Blowfish, RC6

[PDF]

Cite: Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, "Measuring and Reducing Energy Consumption of Cryptographic Schemes for Different Data Types," International Journal of Computer Theory and Engineering vol. 1, no. 3, pp. 318-324, 2009.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.