Notice: Undefined index: uploadName in /var/www/sena-ojs/lib/pkp/classes/template/PKPTemplateManager.inc.php on line 161
Benchmark to determine the best performing encryption system on smart devices | Informador Tecnico
Benchmark to determine the best performing encryption system on smart devices
XML (Español (España))
PDF (Español (España))
PDF (English) (Español (España))
XML (English) (Español (España))

Keywords

smart devices
computer security
mobile communications
encryption algorithms
computational cost dispositivos inteligentes
seguridad informática
comunicaciones móviles
algoritmos de cifrado
gasto computacional

How to Cite

Montoya Benitez, A. O., & Ospina, B. (2020). Benchmark to determine the best performing encryption system on smart devices. Informador Tecnico, 84(2), 175–191. https://doi.org/10.23850/22565035.2782

Abstract

Currently, telecommunications and especially mobile communications have taken great importance and relevance in people's daily activities. However, the use of mobile devices has been threatened by the growing wave of attacks and Trojans as malware (e.g., exploits) for information theft, and fire damage; To mitigate these attacks there are data encryption techniques and authentication processes. In this way, a breach of confidentiality and authenticity in communications can be avoided. On the other hand, some of the existing encryption algorithms are insecure and may require high computational costs. This work analyzes the performance of three of the main encryption algorithms defined by the National Institute of Standards and Technology (NIST): Rijndael as Advanced Encryption Standard (AES), Serpent and Twofish, specifying their main operating characteristics, analyzing performance tests on smart devices, to determine which of these algorithms is the most appropriate to be implemented in each device. Finally, an equation called computational cost is generated, which is a function of RAM, CPU, and battery drain; that analyses for symmetries encryption algorithms that can be performed on similar devices to those treated in this experiment.

https://doi.org/10.23850/22565035.2782
XML (Español (España))
PDF (Español (España))
PDF (English) (Español (España))
XML (English) (Español (España))

References

Alomari, Mohammad; Samsudin, Khairulmizam (2011). A framework for GPU-accelerated AES-XTS encryption in mobile devices. TENCON 2011 - 2011 IEEE Region 10 Conference (pp.144-148). Bali, Indonesia. 10.1109/TENCON.2011.6129080

Anderson, Ross; Biham, Eli; Knudsen, Lars (1998). Serpent: A New Block Cipher Proposal. In International Conference on Fast Software Encryption (pp. 222–238). Springer, LNCS.

Bandung, Yoanes; Priyatna, Andri (2017). Development of key exchange protocol to enhance security of voice over internet protocol on mobile phone. International Journal on Electrical Engineering and Informatics, 9(1), 173-184. http://dx.doi.org.itm.elogim.com/10.15676/ijeei.2017.9.1.12

Bian, Jiali; Lu, Bei; Kuang, Jian (2012). A new hierarchical file encryption system based on smartphone, Computer Science and Network Technology (ICCSNT). In Proceedings of 2012 2nd International Conference on Computer Science and Network Technology (pp. 943-946). Changchun, China. 10.1109/ICCSNT.2012.6526082

Castro, Diego; Coral, William; Cabra, José; Colorado, Julián; Méndez, Diego; Trujillo, Luis (2017). Survey on IoT solutions applied to Healthcare. DYNA, 84(203), 192-200. http://dx.doi.org/10.15446/dyna.v84n203.64558

Dussán, Sergio; Vanegas, Oscar; Chavarro, Adrián; Molina, Johan (2016). Diseño e implementación de un prototipo electrónico para monitoreo de parámetros físico-químicos en cultivo de tilapia a través de una aplicación móvil. Informador Técnico, 80(1), 49-60. https://doi.org/10.23850/22565035.322

FIPS PUBS (2001). Announcing the ADVANCED ENCRYPTION STANDARD (AES). Recuperado de: https://www.cisco.com/c/dam/en/us/products/collateral/security/anyconnect-secure-mobility-client/fips.pdf

Karimi, Rohollah; Kalantari, Mohammad (2011). Enhancing security and confidentiality on mobile devices by location-based data encryption, Networks (ICON), 2011 17th IEEE International Conference on Networks (pp. 241-245). Singapore, Singapore. 10.1109/ICON.2011.6168482

Khan, Abdul; Kiah, M.; Khan, Samee; Madani, Sajjad; Khan, Atta (2013). A study of incremental cryptography for security schemes in mobile cloud computing environments. In 013 IEEE Symposium on Wireless Technology & Applications (ISWTA) (pp. 62-67). Kuching, Malaysia. 10.1109/ISWTA.2013.6688818

Kupreev, Oleg; Sidorina, Tatyana; Chebyshev, Victor; Kuskov, Vladimir (2019). Financial threats in H1 2019. Recuperado de: https://securelist.com/financial-threats-in-h1-2019/91899/.

RSA Laboratories (2002). PKCS #1 v2.1: RSA Cryptography Standard. Recuperado de: https://www.cryptrec.go.jp/en/cryptrec_03_spec_cypherlist_files/PDF/pkcs-1v2-12.pdf

Qi, Na; Pan, Jing; Ding, Qun (2011). The Implementation of FPGA-based RSA Public-key Algorithm and its Application in Mobile-phone SMS Encryption System, In 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control (pp. 700-703). Beijing, China. 10.1109/IMCCC.2011.178

Ren, Yonglin; Boukerche, Azzedine; Nelem, Richard (2010). Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks, IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 6-10). Miami, FL, USA.

Saberi, Iman; Shojaie, Bahareh; Salleh, Mazleena; Niknafskermani, Mahan; Morteza, Seyyed (2012). Improving confidentiality of AES-CCMP in IEEE 802.11i. In 2012 International Joint Conference on Computer Science and Software Engineering (JCSSE). (pp. 82-86). Bangkok, Thailand. 10.1109/JCSSE.2012.6261930

Schneier, Bruce; Kelsey, John; Withing, Doug; Wagner, David; Hall, Chris; Ferguson, Niels (1998). The Twofish Encryption Algorithm: A 128-Bit Block Cipher. EE.UU.: Wiley.

Shivkumar, S.; Umamaheswari, G. (2011). Performance Comparison of Advanced Encryption Standard (AES) and AES Key Dependent S-Box - Simulation Using MATLAB. In 2011 International Conference on Process Automation, Control and Computing. (pp.1-6). Coimbatore, India.

Tecnology Day revista IT Now (2013). Tecnology Day. Recuperado de: http://revistaitnow.com/2013/05/seguridad/aumentan-ataques-a-dispositivos-moviles/

Tovar, José; Diaz, Juan; Quiñones, Getssy; Pabón, Anabella; García, José (2018). Development of an information system for teleoperated physical rehab care service via Internet. Pilot case: patients with mild knee injury who live in geographically vulnerable zones. DYNA, 8(205), 284-293. http://dx.doi.org/10.15446/dyna.v85n204.67961.

Uskov, Alexander (2012). Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp.1042-1048). Liverpool, UK. 10.1109/TrustCom.2012.187

Umaparvathi, M.; Varughese, Dharmishtan (2010). Evaluation of symmetric encryption algorithms for MANETs. In 2010 IEEE International Conference on Computational Intelligence and Computing Research (pp.1-3). Coimbatore, India. 10.1109/ICCIC.2010.5705754

Zhang, Wen-Xiang; Xiao, Si-You; Zhang, Yi (2010). Research on Image-Text Encryption Techniques in Mobile Communications, 2010 Second WRI Global Congress on Intelligent Systems (pp.115-118). Wuhan, China. 10.1109/GCIS.2010.184

ISO/IEC (2005). ISO/IEC 27001: 2005 Tecnología de la información - Técnicas de seguridad - Especificación para un sistema de gestión de seguridad de la información. Ginebra, Suiza: ISO/IEC.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2020 Servicio Nacional de Aprendizaje SENA

Downloads

Download data is not yet available.