Checking EABC performance in comparison others cryptography algorithms
Journal: International Journal of Computer Science and Network Solutions (IJCSNS) (Vol.1, No. 1)Publication Date: 2013-08-15
Authors : Hamid Mehdi;
Page : 51-57
Keywords : Execution time; CPU Utilization; Throughput of encrypting/decrypting; EABC;
Abstract
Nowadays, selecting algorithm to encryption data is very important considering attacks are varied and according to there are many encryption algorithms to protect information. Therefore choosing one algorithm is hard among many algorithms. Data confidentiality is one of the most important functions of encryption algorithms, it means when the transferring data between different systems is vague for unauthorized systems or people. Moreover, Encryption algorithms must maintain data integrity and provide availability for information. New encryption methods cause the attackers cannot simply access to the information and do not allow discovering the relationship between information and the encrypted one. Therefore, availability can be difficult for them. Existing complexities make their longevity and effectiveness increase. In This Article, It has been tried to check EABC performance considering execution time, CPU Utilization, Throughput of encrypting/decrypting database.
Other Latest Articles
- PTV: Presenting new way for Proving Traffic Violations system Using Wireless Sensor Networks
- Optimization Load Balancing Scheduling Algorithm in Distributed Multi-Agent Systems
- Inference System Modeling Using Hybrid Evolutionary Algorithm: Application to breast cancer data set
- Reducing Energy Consumption in Billboards Using Wireless Sensor Networks
- A novel approach for ID distribution problem in Tree-based tag anti-collision protocols of RFID systems
Last modified: 2013-09-23 04:45:39