ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Performance Evaluation of Lightweight Encryption Algorithms for Images Applications

المصدر: مجلة الدراسات المستدامة
الناشر: الجمعية العلمية للدراسات التربوية المستدامة
المؤلف الرئيسي: Abd Ali, Wurood Saleh (Author)
المجلد/العدد: مج6, ملحق
محكمة: نعم
الدولة: العراق
التاريخ الميلادي: 2024
التاريخ الهجري: 1446
الشهر: أيلول
الصفحات: 2386 - 2401
ISSN: 2663-2284
رقم MD: 1495823
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: EduSearch
مواضيع:
كلمات المؤلف المفتاحية:
Chaotic System | Logistic Map | S-Box | Permutation | Substitution | Image Encryption
رابط المحتوى:
صورة الغلاف QR قانون

عدد مرات التحميل

1

حفظ في:
المستخلص: Currently, all modern smartphones, laptops, and other communication devices have the capability to establish a connection with the cloud, allowing for data to be easily accessed from any location. When these devices are linked to each other over the internet, they form an internet network that shares data between network nodes and other services. The Internet and data transport have a wide range of applications, from smart applications to numerous industrial uses. Nevertheless, the substantial amount of data sent over the network necessitates the implementation of procedures to ensure the safe and secure transit of the data. Encryption is one of the most effective methods for providing comprehensive security from one end to another. In the context of an internet network, nodes have limited resources, and the use of traditional encryption techniques is expensive and inefficient. Therefore, lightweight block ciphers are a smart approach to address security issues in this context. This paper evaluates the performance of ten lightweight algorithms, namely AES, PRESENT, LBlock, Skipjack, SIMON, XTEA, PRINCE, Piccolo, HIGHT, and RECTANGLE. The evaluation focuses on key factors such as memory usage (RAM and ROM), energy consumption, throughput, and execution time. Both encryption and decryption modes are considered, specifically in the context of cloud transmission. This study aims to assist IoT developers in selecting the appropriate platform and encryption technique for establishing a secure network, taking into account many elements such as energy and memory utilization, with a particular focus on software platforms.

ISSN: 2663-2284

عناصر مشابهة