• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2009 Vol.1(3): 318-324 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2009.V1.51

Measuring and Reducing Energy Consumptionof Cryptographic Schemes for Different Data Types

Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud

Abstract—Security can be provided at different levels using different settings with different security algorithms, which can consume different levels of energy. The security settings can be different in many factors, but the main factors are the choice of ciphers used to provide security functions, the key length, and the number of operational rounds, packet size, and data types. These factors also have a significant impact on the energy consumption for providing security. A security algorithm is a function that is commonly used to provide security services such as encryption and message authentication. Many ciphers have been created, but only few are known to be strong and secure, which means no loophole or backdoor is known. The study of the energy consumption of the encryption schemes in wireless devices is essential in design of energy efficient security protocols. The major contributions of this paper are energy-security trades off then, some suggestions for design of secure communications systems. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed.

Index Terms—Encryption techniques, Computer security, AES, DES, RC2, 3DES, Blowfish, RC6

[PDF]

Cite: Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, "Measuring and Reducing Energy Consumption of Cryptographic Schemes for Different Data Types," International Journal of Computer Theory and Engineering vol. 1, no. 3, pp. 318-324, 2009.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com