Comparison of encryption algorithms performance on iOS platform


Abstract

The subject of this article is to compare iOS mobile operation system encryption algorithms performance. The main target is to analyze symmetrical and asymmetrical algorithms, test them how much time encryptionand key generation operations take. Tests were carried out on various devices with the same version of operating system.


Keywords

encryption algorithms; iOS system; encryption performance

[1] Binnie C.: Linux Server Security: Hack and Defend, Wiley, 2016.
[2] Butkiewicz M., Madhyastha H. V., Sekar V., Wang D, Wu Z.: Reprioritizing Web Content to ImproveUser Experience on Mobile Devices, University of Michigan, https://www.usenix.org/system/files/conference/nsdi15/nsdi15-paper-butkiewicz.pdf, [10.11.2018]
[3] Hechenblaikner C., StrombergerC., Teufl P., Zefferer T.: iOS Encryption Systems, Deploying iOS Devices in Securitycritical Environments, Institute for Applied 120 Information Processing and Communications, Graz University of Technology, Austria,2013.
[4] PERFORMANCE ANALYSIS OF ELLIPTIC CURVE MULTIPLICATION ALGORITHMS FOR ELLIPTIC CURVE CRYPTOGRAPHY, https://etd.lib.metu.edu.tr/upload/12607698/index.pdf, [10.11.2018]
[5] Support Apple: Identify your iPhoone model, https://support.apple.com/en-us/HT201296, [20.11.2018].

Published : 2019-06-30


Tudruj, J., & Kopniak, P. (2019). Comparison of encryption algorithms performance on iOS platform . Journal of Computer Sciences Institute, 11, 101-105. https://doi.org/10.35784/jcsi.148

Jakub Tudruj  jakub.tudruj@pollub.edu.pl
Lublin University of Technology  Poland
Piotr Kopniak 
Lublin University of Technology  Poland