Comparison of encryption algorithms performance on iOS platform
Jakub Tudruj
jakub.tudruj@pollub.edu.plLublin University of Technology (Poland)
Piotr Kopniak
Lublin University of Technology (Poland)
Abstract
The subject of this article is to compare iOS mobile operation system encryption algorithms performance. The main target is to analyze symmetrical and asymmetrical algorithms, test them how much time encryptionand key generation operations take. Tests were carried out on various devices with the same version of operating system.
Keywords:
encryption algorithms; iOS system; encryption performanceReferences
[1] Binnie C.: Linux Server Security: Hack and Defend, Wiley, 2016.
[2] Butkiewicz M., Madhyastha H. V., Sekar V., Wang D, Wu Z.: Reprioritizing Web Content to ImproveUser Experience on Mobile Devices, University of Michigan, https://www.usenix.org/system/files/conference/nsdi15/nsdi15-paper-butkiewicz.pdf, [10.11.2018]
[3] Hechenblaikner C., StrombergerC., Teufl P., Zefferer T.: iOS Encryption Systems, Deploying iOS Devices in Securitycritical Environments, Institute for Applied 120 Information Processing and Communications, Graz University of Technology, Austria,2013.
[4] PERFORMANCE ANALYSIS OF ELLIPTIC CURVE MULTIPLICATION ALGORITHMS FOR ELLIPTIC CURVE CRYPTOGRAPHY, https://etd.lib.metu.edu.tr/upload/12607698/index.pdf, [10.11.2018]
[5] Support Apple: Identify your iPhoone model, https://support.apple.com/en-us/HT201296, [20.11.2018].
[2] Butkiewicz M., Madhyastha H. V., Sekar V., Wang D, Wu Z.: Reprioritizing Web Content to ImproveUser Experience on Mobile Devices, University of Michigan, https://www.usenix.org/system/files/conference/nsdi15/nsdi15-paper-butkiewicz.pdf, [10.11.2018]
[3] Hechenblaikner C., StrombergerC., Teufl P., Zefferer T.: iOS Encryption Systems, Deploying iOS Devices in Securitycritical Environments, Institute for Applied 120 Information Processing and Communications, Graz University of Technology, Austria,2013.
[4] PERFORMANCE ANALYSIS OF ELLIPTIC CURVE MULTIPLICATION ALGORITHMS FOR ELLIPTIC CURVE CRYPTOGRAPHY, https://etd.lib.metu.edu.tr/upload/12607698/index.pdf, [10.11.2018]
[5] Support Apple: Identify your iPhoone model, https://support.apple.com/en-us/HT201296, [20.11.2018].
Tudruj, J., & Kopniak, P. (2019). Comparison of encryption algorithms performance on iOS platform . Journal of Computer Sciences Institute, 11, 101–105. https://doi.org/10.35784/jcsi.148
Authors
Piotr KopniakLublin University of Technology Poland
Statistics
Abstract views: 302PDF downloads: 208
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.