PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices

نویسندگان

  • José Bringel Filho
  • Windson Viana
  • Rossana M. de Castro Andrade
  • André Jalles Monteiro
چکیده

Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cryptographic algorithm for each mobile device has become a critical factor. In this paper, we present an approach for performance evaluation of cryptographic algorithms for mobile devices. To validate the approach, a tool called PEARL (PErformance evaluAtor of cryptogRaphic aLgorithms for mobile devices) is introduced. This tool collects and analyzes information related to the executions of the cryptographic algorithms in the mobile devices. PEARL also allows evaluating the performance of symmetrical and asymmetrical cryptographic algorithms and hashing functions for the J2ME platform.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Performance Evaluation Of New Hybrid Encryption Algorithms To Be Used For Mobile Cloud Computing

Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client to overcome on the limitation of mobile devices and uses the main advantage of cloud computing. As mobile cloud computing continues to grow, so ...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Efficient Authentication Protocols for Mobile Hand-held Devices with Minimum Power Consumption

Mobile phone in day-to-day life has become an important communication device, subjected from formal and informal talks to sharing important and secure information. These secure information falls from personal communication to large business deals. Hence, there is a necessity to ensure security to the applications that are used to transfer confidential information. In order to satisfy the users’...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004