원문정보
초록
영어
In this paper we present empirical results obtained from Java implementation of Elliptic curve Cryptosystem (ECC) as an asymmetric block cipher algorithm and a set of symmetric block cipher algorithms namely Triple-Data Encryption Standard (T-DES), Advanced Encryption Standard (AES), and Blowfish. Performance evaluation based on CPU execution time is presented under WinXP and Linux.
We used in our implementation Java programming language, Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). The evaluation of the performance of these algorithms is done for secret key generation and encryption and decryption operations. Results indicated that ECC outperforms the other encryption/decryption algorithms considered in this study regarding the security strength, speed, and key size of ECC. Also, ECC’s performance advantage increases as security needs increases for newly emerging applications.
목차
1. Introduction
2. The Encryption/Decryption Algorithms
2.1. The ECC Algorithm
2.2. Triple-DES Algorithm
2.3. AES Algorithm
3. Implementation Details
3.1. Encryption/Decryption Processes
3.2. Java and Java Cryptography Architecture
3.3. Packages and Classes used in Implementation
4. Experimental Results and Discussion
4.1. Experiment Environment
4.2. Experimental Results and Analysis
5. Conclusions and Future Work
Acknowledgements
References
