Evaluating time and throughput at different modes of operation in AES algorithm

Mahmoud Alfadel, El Sayed M. El-Alfy, Khaleque Md Aashiq Kamal

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

The analysis of data encryption algorithm performance is becoming an increasing concern. Since most of the algorithms are involved in other applications such as banking services, e-government and online applications, implementation issues are practical concerns. Many experiments have been proposed to compare these techniques based on several parameters such as encryption time, decryption time and memory usage, using variable text files and key sizes. Mode of operation depicts how to excite and encrypt single-block to transform size of data bigger than a block. There are multiple schemes of cipher which can be applied to strengthen the protection of the application. The mostly common techniques are Electronic Codebook-ECB, Chain Block Chaining mode(CBC), Cipher Feedback mode(CFB), and Output Feedback(OFB). This paper presents a summary of several performance evaluation criteria applied to encryption techniques. Also, we analyze the performance of the modes of operation in the AES algorithm based on cipher time and throughput. Different research techniques, e.g. Anova, have been used to conduct the analysis. Different file types have been used to conduct the experiments i.e. text, image and video. The work concluded that the modes ECB, CBC, CFB, and OFB are significantly different in terms of throughput while they are not significantly different in terms of encryption time with 95% confidence level.

Original languageEnglish
Title of host publicationICIT 2017 - 8th International Conference on Information Technology, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages795-801
Number of pages7
ISBN (Electronic)9781509063321
DOIs
StatePublished - 20 Oct 2017

Publication series

NameICIT 2017 - 8th International Conference on Information Technology, Proceedings

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • cryptography algorithms
  • modes of operation
  • performance of cryptography

ASJC Scopus subject areas

  • Information Systems
  • Health Informatics
  • Information Systems and Management
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Evaluating time and throughput at different modes of operation in AES algorithm'. Together they form a unique fingerprint.

Cite this