Open AccessThis article is
- freely available
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
Internet Interdisciplinary Institute, Universitat Oberta de Catalunya, Barcelona 08018, Spain
Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, Campus UAB Edifici Q, Bellaterra 08193, Spain
* Author to whom correspondence should be addressed.
Received: 11 October 2010; in revised form: 30 January 2011 / Accepted: 31 January 2011 / Published: 14 February 2011
Abstract: Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device.
Keywords: ubiquitous networks; performance; time delay; energy; cryptography; ARM architecture
Article StatisticsClick here to load and display the download statistics.
Notes: Multiple requests from the same IP address are counted as one view.
Cite This Article
MDPI and ACS Style
Rifà-Pous, H.; Herrera-Joancomartí, J. Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices. Future Internet 2011, 3, 31-48.
Rifà-Pous H, Herrera-Joancomartí J. Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices. Future Internet. 2011; 3(1):31-48.
Rifà-Pous, Helena; Herrera-Joancomartí, Jordi. 2011. "Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices." Future Internet 3, no. 1: 31-48.