Comparison of encryption algorithms performance on iOS platform

Jakub Tudruj

jakub.tudruj@pollub.edu.pl
Lublin University of Technology (Poland)

Piotr Kopniak


Lublin University of Technology (Poland)

Abstract

The subject of this article is to compare iOS mobile operation system encryption algorithms performance. The main target is to analyze symmetrical and asymmetrical algorithms, test them how much time encryptionand key generation operations take. Tests were carried out on various devices with the same version of operating system.


Keywords:

encryption algorithms; iOS system; encryption performance

[1] Binnie C.: Linux Server Security: Hack and Defend, Wiley, 2016.
[2] Butkiewicz M., Madhyastha H. V., Sekar V., Wang D, Wu Z.: Reprioritizing Web Content to ImproveUser Experience on Mobile Devices, University of Michigan, https://www.usenix.org/system/files/conference/nsdi15/nsdi15-paper-butkiewicz.pdf, [10.11.2018]
[3] Hechenblaikner C., StrombergerC., Teufl P., Zefferer T.: iOS Encryption Systems, Deploying iOS Devices in Securitycritical Environments, Institute for Applied 120 Information Processing and Communications, Graz University of Technology, Austria,2013.
[4] PERFORMANCE ANALYSIS OF ELLIPTIC CURVE MULTIPLICATION ALGORITHMS FOR ELLIPTIC CURVE CRYPTOGRAPHY, https://etd.lib.metu.edu.tr/upload/12607698/index.pdf, [10.11.2018]
[5] Support Apple: Identify your iPhoone model, https://support.apple.com/en-us/HT201296, [20.11.2018].

Published
2019-06-30

Cited by

Tudruj, J., & Kopniak, P. (2019). Comparison of encryption algorithms performance on iOS platform . Journal of Computer Sciences Institute, 11, 101–105. https://doi.org/10.35784/jcsi.148

Authors

Jakub Tudruj 
jakub.tudruj@pollub.edu.pl
Lublin University of Technology Poland

Authors

Piotr Kopniak 

Lublin University of Technology Poland

Statistics

Abstract views: 284
PDF downloads: 195