Studying the effects of most common encryption algorithms
المؤلفون المشاركون
Abd al-Qadir, Hatim
Salamah, Diya
Hadhoud, Muhyi
المصدر
International Arab Journal of E-Technology
العدد
المجلد 2، العدد 1 (31 يناير/كانون الثاني 2011)، ص ص. 1-10، 10ص.
الناشر
تاريخ النشر
2011-01-31
دولة النشر
الأردن
عدد الصفحات
10
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
الموضوعات
الملخص EN
Wireless networks play critical roles in present work, home, and public places, so the needs of protecting of such networks are increased.
Encryption algorithms play vital roles in information systems security.
Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power.
CPU and memory usability are increasing with a suitable rates, but battery technology is increasing at slower rate.
The problem of the slower increasing battery technology forms “battery gap”.
The design of efficient secure protocols for wireless devices from the view of battery consumption needs to understand how encryption techniques affect the consumption of battery power with and without data transmission.
This paper studies the effects of six of the most common symmetric encryption algorithms on power consumption for wireless devices.
at different settings for each algorithm.
These setting include different sizes of data blocks, different data types (text, images, and audio file), battery power consumption, different key size, different cases of transmission of the data, effect of varying signal to noise ratio and finally encryption / decryption speed.
The experimental results show the superiority of two encryption algorithm over other algorithms in terms of the power consumption, processing time, and throughput .These results can aid in new design of security protocol where energy efficiency is the main focus.
Some suggestions for design of secure communications systems to handle the varying wireless environment have been provided to reduce the energy consumption of security protocols.
نمط استشهاد جمعية علماء النفس الأمريكية (APA)
Salamah, Diya& Abd al-Qadir, Hatim& Hadhoud, Muhyi. 2011. Studying the effects of most common encryption algorithms. International Arab Journal of E-Technology،Vol. 2, no. 1, pp.1-10.
https://search.emarefa.net/detail/BIM-245066
نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)
Abd al-Qadir, Hatim…[et al.]. Studying the effects of most common encryption algorithms. International Arab Journal of E-Technology Vol. 2, no. 1 (Jan. 2011), pp.1-10.
https://search.emarefa.net/detail/BIM-245066
نمط استشهاد الجمعية الطبية الأمريكية (AMA)
Salamah, Diya& Abd al-Qadir, Hatim& Hadhoud, Muhyi. Studying the effects of most common encryption algorithms. International Arab Journal of E-Technology. 2011. Vol. 2, no. 1, pp.1-10.
https://search.emarefa.net/detail/BIM-245066
نوع البيانات
مقالات
لغة النص
الإنجليزية
الملاحظات
Includes bibliographical references : p. 9-10
رقم السجل
BIM-245066
قاعدة معامل التأثير والاستشهادات المرجعية العربي "ارسيف Arcif"
أضخم قاعدة بيانات عربية للاستشهادات المرجعية للمجلات العلمية المحكمة الصادرة في العالم العربي
تقوم هذه الخدمة بالتحقق من التشابه أو الانتحال في الأبحاث والمقالات العلمية والأطروحات الجامعية والكتب والأبحاث باللغة العربية، وتحديد درجة التشابه أو أصالة الأعمال البحثية وحماية ملكيتها الفكرية. تعرف اكثر