Abstract
Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cryptographic algorithm for each mobile device has become a critical factor. In this paper, we present an approach for performance evaluation of cryptographic algorithms for mobile devices. A tool called PEARL (PErformance evaluAtor of cryptogRaphic aLgorithms for mobile devices) is also introduced in this work to validate the approach. This tool collects and analyzes information related to executions of the cryptographic algorithms in the mobile devices. Moreover, PEARL allows evaluating the performance of symmetrical and asymmetrical cryptographic algorithms, and hash functions for the J2ME platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Winkle, W.V.: Palm Business Applications. In: The Ultimate guide to mobile computing: 2002 mobile Technology, pp. 82–89 (2002)
Stallings, W.: Network security essentials: applications and standards / William Stallings ISBN: 0-13-016093-8
The Legion of Bouncy Castle. Cryptography API for Java, Available at http://www.bouncycastle.org (Last access in: February 2003)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography (October 1996)
Susilo, W.: Securing Handheld devices. In: 10th IEEE International Conference, Wollongong, pp. 349–354 (2002)
Wong, D.S., Fuentes, H.H., Chan, A.H.: The Performance Measurement of Cryptographic Primitives on Palm Devices, Boston, pp. 1–10 (2002)
Java 2 Platform, Micro Edition (J2ME), Available at http://java.sun.com/j2me (Last access in: March 10, 2003)
Argyroudis, P.G., Verma, R., Tewari, H., O’Mayony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices (2003)
Windows CE, Disponível em, http://www.microsoft.com/windowsce/ (Last access in: January 10, 2004)
Superwaba: The Java VM for PDAs, Available at http://www.superwaba.com.br (Last access in: March 10, 2003)
Microsoft. Mobile ASP.NET Web Applications, Available at http://www.asp.net/default.aspx?tabIndex=6&tabId=44 (Last access in: March 10, 2003)
Qualcomm. Qualcomm Brew, Available at http://www.qualcomm.com/brew/ (Last access in: March 15, 2003)
PalmOne, Available at http://www.palm.com/ (Last access in: March 15, 2003)
SonyEricsson, Available at: http://developer.sonyericsson.com/site/global/home/p_home.jsp (Last access in: March 10, 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Filho, B., Viana, W., Andrade, R., Monteiro, A.J. (2004). PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds) Mobility Aware Technologies and Applications. MATA 2004. Lecture Notes in Computer Science, vol 3284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30178-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-30178-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23423-4
Online ISBN: 978-3-540-30178-3
eBook Packages: Springer Book Archive