ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Performance Evaluation of Lightweight Encryption Algorithms for Images Applications

المصدر: مجلة الدراسات المستدامة
الناشر: الجمعية العلمية للدراسات التربوية المستدامة
المؤلف الرئيسي: Abd Ali, Wurood Saleh (Author)
المجلد/العدد: مج6, ملحق
محكمة: نعم
الدولة: العراق
التاريخ الميلادي: 2024
التاريخ الهجري: 1446
الشهر: أيلول
الصفحات: 2386 - 2401
ISSN: 2663-2284
رقم MD: 1495823
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: EduSearch
مواضيع:
كلمات المؤلف المفتاحية:
Chaotic System | Logistic Map | S-Box | Permutation | Substitution | Image Encryption
رابط المحتوى:
صورة الغلاف QR قانون

عدد مرات التحميل

1

حفظ في:
LEADER 02719nam a22002177a 4500
001 2239736
041 |a eng 
044 |b العراق 
100 |9 793771  |a Abd Ali, Wurood Saleh  |e Author 
245 |a Performance Evaluation of Lightweight Encryption Algorithms for Images Applications 
260 |b الجمعية العلمية للدراسات التربوية المستدامة  |c 2024  |g أيلول  |m 1446 
300 |a 2386 - 2401 
336 |a بحوث ومقالات  |b Article 
520 |b Currently, all modern smartphones, laptops, and other communication devices have the capability to establish a connection with the cloud, allowing for data to be easily accessed from any location. When these devices are linked to each other over the internet, they form an internet network that shares data between network nodes and other services. The Internet and data transport have a wide range of applications, from smart applications to numerous industrial uses. Nevertheless, the substantial amount of data sent over the network necessitates the implementation of procedures to ensure the safe and secure transit of the data. Encryption is one of the most effective methods for providing comprehensive security from one end to another. In the context of an internet network, nodes have limited resources, and the use of traditional encryption techniques is expensive and inefficient. Therefore, lightweight block ciphers are a smart approach to address security issues in this context. This paper evaluates the performance of ten lightweight algorithms, namely AES, PRESENT, LBlock, Skipjack, SIMON, XTEA, PRINCE, Piccolo, HIGHT, and RECTANGLE. The evaluation focuses on key factors such as memory usage (RAM and ROM), energy consumption, throughput, and execution time. Both encryption and decryption modes are considered, specifically in the context of cloud transmission. This study aims to assist IoT developers in selecting the appropriate platform and encryption technique for establishing a secure network, taking into account many elements such as energy and memory utilization, with a particular focus on software platforms. 
653 |a الأجهزة الذكية  |a خوارزميات التشفير  |a تشفير الصور الرقمية  |a خريطة لوجستية 
692 |b Chaotic System  |b Logistic Map  |b S-Box  |b Permutation  |b Substitution  |b Image Encryption 
773 |4 التربية والتعليم  |6 Education & Educational Research  |c 113  |e Journal of Sustainable Studies  |f Mağallaẗ al-dirāsāt al-mustadāmaẗ  |l 988  |m مج6, ملحق  |o 2053  |s مجلة الدراسات المستدامة  |v 006  |x 2663-2284 
856 |u 2053-006-988-113.pdf 
930 |d y  |p y  |q y 
995 |a EduSearch 
999 |c 1495823  |d 1495823 

عناصر مشابهة