Performance of the AES Candidate Algorithms in Java

نویسندگان

  • Andreas Sterbenz
  • Peter Lipp
چکیده

We analyze the five remaining AES candidate algorithms MARS, RC6, Rijndael, Serpent, and Twofish as well as DES, Triple DES, and IDEA by examining independently developed Java implementations. We give performance measurement results on several platforms, list the memory requirements, and present a subjective estimate for the implementation difficulty of the algorithms. Our results indicate that all AES ciphers offer reasonable performance in Java, the fastest algorithm being about twice as fast as the slowest.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard

The evaluation criteria for the Advanced Encryption Standard (AES) Round2 candidate algorithms, as specified in the “Request for Comments” [1], includes computational efficiency, among other criteria. Specifically, the “Call For AES Candidate Algorithms” [2] required both Reference ANSI C code and Optimized ANSI C code, as well as Java code. Additionally, a “reference” hardware and software pl...

متن کامل

Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms

Received May 5 th , 2012 Revised May 31 st , 2012 Accepted June 2 nd , 2012 In open literature there is a lack of focus on Shannon‟s secrecy of ciphers as a security measurement of symmetric key encryption, hence in this research, Shannon‟s theories on secrecy of ciphers were used to calculate the average secrecy of each symmetric cipher used in this research. All secrecy and performance analys...

متن کامل

PERFORMANCE ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS: DES, AES and BLOWFISH

Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed ...

متن کامل

DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis

Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000