DocumentCode
73132
Title
Power evaluation methods for data encryption algorithms
Author
Tingyuan Nie ; Lijian Zhou ; Zhe-Ming Lu
Author_Institution
Commun. & Electron. Eng. Inst., Qingdao Technol. Univ., Qingdao, China
Volume
8
Issue
1
fYear
2014
fDate
Feb-14
Firstpage
12
Lastpage
18
Abstract
With the increasingly extensive application of networking technology, security of network becomes significant than ever before. Encryption algorithm plays a key role in construction of a secure network system. However, the encryption algorithm implemented on resource-constrained device is difficult to achieve ideal performance. The issue of power consumption becomes essential to performance of data encryption algorithm. Many methods are proposed to evaluate the power consumption of encryption algorithms yet the authors do not ensure which one is effective. In this study, they give a comprehensive review for the methods of power evaluation. They then design a series of experiments to evaluate the effectiveness of three main types of methods by implementing several traditional symmetric encryption algorithms on a workstation. The experimental results show that external measurement and software profiling are more accurate than that of uninterruptible power system battery. The improvement of power consumption is 27.44 and 33.53% which implies the method of external measurement and software profiling is more effective in power consumption evaluation.
Keywords
computer network security; cryptography; telecommunication power management; data encryption algorithm; external measurement method; network security; networking technology; power consumption evaluation; power consumption improvement; power evaluation method; resource-constrained device; secure network system construction; software proflling; symmetric encryption algorithm;
fLanguage
English
Journal_Title
Software, IET
Publisher
iet
ISSN
1751-8806
Type
jour
DOI
10.1049/iet-sen.2012.0137
Filename
6720046
Link To Document