Title :
Performance metric analysis for mobile encryption algorithm using Bouncy Castle Toolkit
Author :
Sivasankari, M.N. ; Sujatha, S.
Author_Institution :
Pervasive Comput. Technol., Anna Univ. of Technol., Tiruchirappalli, India
Abstract :
Mobile Computing devices are increasing enormously in all fields of communication, which aims to focus on secure transfer of information. In order to provide authentication, message integrity and secure message transfer, developers need to access the cryptographic packages. The objective of this paper is to analyze and compare various algorithms discussed in Bouncy Castle Toolkit. Analysis was performed for the key generation, encryption and decryption of the information in terms of time and memory requirement. From the depicted graphical representation, a comparative study for both Symmetric and Asymmetric algorithms was performed in which TEA, XTEA and AES Fast proves to be good than ECC.
Keywords :
authorisation; cryptography; mobile computing; AES Fast; ECC; XTEA; asymmetric algorithms; authentication; bouncy castle toolkit; cryptographic packages; decryption; graphical representation; key generation; message integrity; mobile computing devices; mobile encryption algorithm; secure information transfer; secure message transfer; Algorithm design and analysis; Elliptic curve cryptography; Encryption; Java; Mobile communication; Bouncy Castle Toolkit; ECC; Encryption algorithm; Mobile Cryptography package; TEA;
Conference_Titel :
Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on
Conference_Location :
Tamil Nadu
Print_ISBN :
978-1-4244-7923-8
DOI :
10.1109/ICETECT.2011.5760282