Title :
Characterizing Power and Resource Consumption of Encryption/Decryption in Portable Devices
Author :
Soewito, Benfano ; Vespa, Lucas ; Weng, Ning
Author_Institution :
Dept. of Electr. & Comput. Eng., Southern Illinois Univ., Carbondale, IL
Abstract :
One way to facilitate private communication is to transform information using encryption. However, encryption algorithms are computation-intensive and power-hungry operations for portable devices, which have computing resource limits and energy constraints. Choosing a suitable encryption-decryption algorithm to implement in portable devices is an important decision that needs to be made in order to secure the exchange of sensitive information without over utilizing the power source, processor and memory in mobile devices. This paper provides a methodology to comprehensively evaluate encryption/decryption algorithms for portable devices based on energy, delay, and footprint. Our result is based on four cutting edge algorithms: RC6, Serpent, Mars, and Twofish, and can help to analyze the power and resource overhead of encryption/decryption, as well as other applications running on mobile devices.
Keywords :
cryptography; low-power electronics; mobile radio; telecommunication security; encryption-decryption algorithm; mobile communication device; mobile electronic device; portable device; power consumption; resource consumption; secure private communication; Batteries; Cryptography; Delay; Energy consumption; Mars; Mobile communication; NIST; Portable computers; Power engineering computing; Wireless sensor networks; Decryption; Encryption; Low-power; Performance estimation;
Conference_Titel :
Region 5 Conference, 2008 IEEE
Conference_Location :
Kansas City, MO
Print_ISBN :
978-1-4244-2076-6
Electronic_ISBN :
978-1-4244-2077-3
DOI :
10.1109/TPSD.2008.4562749