Abstract
This paper presents results on modelling of AES encryption algorithm in terms of CPU execution time, considering different modelling techniques such as linear, quadratic, cubic and exponential mathematical models, each with the application of piecewise approximations. C#.net framework is used to implement this study. This study recommends quadratic piecewise approximation modelling as the most optimized model for modelling the CPU execution time of AES towards encryption of data files. The model proposed in this study can be extended to other encryption algorithms, besides taking them over a mobile cloud environment also.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Other parameters such as memory swap time, cache miss time can be included. However, encryption algorithm is usually in memory-resident state. Therefore, CPU execution time is the dominant parameter over all the other parameters to be considered.
- 2.
This model is not considered for the comparison, as it was plotted with only three points and it yields only a quadratic equation.
References
Kaliisa, R., Picard, M.: A systematic review on mobile learning in higher education: the African perspective. Turkish Online J. Educat. Technol. 16(1) (2017)
Telecommunication Union, Measuring the Information Society Report Executive summary 2018, Switzerland, Geneva, ITU Publications (2018)
Callou, G., Maciel, P., Tavares, E., Andrade, E., Nogueira, B., Araujo, C., Cunha, P.: Energy consumption and execution time estimation of embedded system applications. Microproc. Microsyst. 35 426–440 (2011) (2010), Elsevier
Toldinas, J., Damasevicius, R., Venckauskas, A., Blazauskas, T., Ceponis, J.: Energy consumption of cryptographic algorithms in mobile devices. ELEKTRONIKA IR ELEKTROTECHNIKA 20(5) (2014). ISSN 1392–1215
Montoya, A.O., Munoz, M.A., Kofuji, S.T.: Performance analysis of encryption algorithms on mobile devices. In: 47th International Carnahan Conference on Security Technology. IEEE, Colombia (2013)
Lu, C., Tseng, S.: Integrated design of AES encrypter and decrypter. In: Proceedings IEEE International Conference on Application Specific Systems, Architectures, and Processors, USA (2002)
Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: International Conference on Circuits, Power and Computing Technologies. IEEE, India (2013)
Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Tradeoffs between energy consumption and security of symmetric encryption algorithms. Int. J. Comput. Theory Eng. 1(3), 1793–8201 (2009)
Javed, A., Shahid, M.A., Sharif, M., Yasmin, M.: Energy consumption in mobile phones, I. J. Comput. Netw. Informat. Secur. 12, 18–28. Modern Education and Computer Science Press
Dolezal, J., Becvar, Z.: Methodology and tool for energy consumption modeling of mobile devices. In: IEEE Wireless Communications and Networking Conference Workshops, April 2014
Marsiglio, J.: Piecewise linear approximation. https://optimization.mccormick.northwestern.edu/index.php/Piecewise_linear_approximation. Last accessed 13 Apr 2019
Fallah, S.A., Arioua, M., Oualkadi, A.E., Asri, J.E.: On the performance of piecewise linear approximation techniques in WSNs. International Conference on Advanced Communication Technologies and Networking, Marrakech (2018)
Umaparvathi, M., Varughese, D.K.: Evaluation of symmetric encryption algorithms for MANETs. In: International Conference on Computational Intelligence and Computing Research. IEEE, India (2010)
Stewart, D.B.: Measuring execution time and real-time performance. In: Embedded Systems Conference, Boston (2006)
Pereira, R., Couto, M., Ribeiro, F., Cunha, J., Fernandes, J.P., Saraiva, J.: Energy efficiency across programming languages. In: Proceedings of Software Language Engineering, 12 pp. ACM, Canada (2017)
Kaufmann, J.: Reply to “What do you consider a good standard deviation?”. https://www.researchgate.net/post/What_do_you_consider_a_good_standard_deviation. Last accessed 25 Apr 2019
Martin, K.G.: Assessing the fit of regression models. https://www.theanalysisfactor.com/assessing-the-fit-of-regression-models/. Last accessed 23 Apr 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thomas, A., Narasimhan, V.L. (2021). Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment. In: Satapathy, S., Zhang, YD., Bhateja, V., Majhi, R. (eds) Intelligent Data Engineering and Analytics. Advances in Intelligent Systems and Computing, vol 1177. Springer, Singapore. https://doi.org/10.1007/978-981-15-5679-1_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-5679-1_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5678-4
Online ISBN: 978-981-15-5679-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)