Reference Hub1
Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment

Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment

Ambili Thomas, V. Lakshmi Narasimhan
Copyright: © 2021 |Volume: 10 |Issue: 2 |Pages: 21
ISSN: 1947-928X|EISSN: 1947-9298|EISBN13: 9781799861294|DOI: 10.4018/IJNCR.2021040102
Cite Article Cite Article

MLA

Thomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment." IJNCR vol.10, no.2 2021: pp.21-41. http://doi.org/10.4018/IJNCR.2021040102

APA

Thomas, A. & Narasimhan, V. L. (2021). Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment. International Journal of Natural Computing Research (IJNCR), 10(2), 21-41. http://doi.org/10.4018/IJNCR.2021040102

Chicago

Thomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment," International Journal of Natural Computing Research (IJNCR) 10, no.2: 21-41. http://doi.org/10.4018/IJNCR.2021040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper presents results on modelling of AES and RSA encryption algorithms in terms of CPU execution time, considering different modelling techniques such as linear, quadratic, cubic, and exponential mathematical models, each with the application of piecewise approximations. C#.net framework is used to implement this study. The authors consider the symmetric encryption algorithm named AES and the asymmetric encryption algorithm named RSA to carry out this study. This study recommends quadratic piecewise approximation modelling as the most optimized model for modelling the CPU execution time of AES and RSA towards encryption of data files. The model proposed in this study can be extended to other symmetric and asymmetric encryption algorithms, besides taking them over a mobile cloud environment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.