Power evaluation methods for data encryption algorithms

With the increasingly extensive application of networking technology, security of network becomes significant than ever before. Encryption algorithm plays a key role in construction of a secure network system. However, the encryption algorithm implemented on resource-constrained device is difficult to achieve ideal performance. The issue of power consumption becomes essential to performance of data encryption algorithm. Many methods are proposed to evaluate the power consumption of encryption algorithms yet the authors do not ensure which one is effective. In this study, they give a comprehensive review for the methods of power evaluation. They then design a series of experiments to evaluate the effectiveness of three main types of methods by implementing several traditional symmetric encryption algorithms on a workstation. The experimental results show that external measurement and software profiling are more accurate than that of uninterruptible power system battery. The improvement of power consumption is 27.44 and 33.53% which implies the method of external measurement and software profiling is more effective in power consumption evaluation.

[1]  Elaine B. Barker,et al.  Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .

[2]  Sagar Naik,et al.  Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.

[3]  Sang H. Dhong,et al.  A cycle accurate power estimation tool , 2006, Asia and South Pacific Conference on Design Automation, 2006..

[4]  Mahadev Satyanarayanan,et al.  PowerScope: a tool for profiling the energy usage of mobile applications , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Sharad Malik,et al.  Power analysis of embedded software: a first step towards software power minimization , 1994, IEEE Trans. Very Large Scale Integr. Syst..

[6]  Prashant Krishnamurthy,et al.  Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[7]  Mika Kuulusa,et al.  Optimizing Mobile Software with Built-in Power Profiling , 2007 .

[8]  Sagar Naik,et al.  Software Implementation Strategies for Power-Conscious Systems , 2001, Mob. Networks Appl..

[9]  C. Adams,et al.  DESIGNING S-BOXES FOR CIPHERS RESISTANT TO DIFFERENTIAL CRYPTANALYSIS ( Extended , 1993 .

[10]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[11]  S. Godsill,et al.  The Institution of Engineering and Technology Seminar on Target Tracking and Data Fusion , 2008 .

[12]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[13]  Todd M. Austin,et al.  SimpleScalar: An Infrastructure for Computer System Modeling , 2002, Computer.

[14]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[15]  Scott F. Midkiff,et al.  Performance and energy efficiency of block ciphers in personal digital assistants , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[16]  Frank H. P. Fitzek,et al.  Mobile Phone Programming: and its Application to Wireless Networking , 2007 .

[17]  Stefan Tillich,et al.  Energy evaluation of software implementations of block ciphers under memory constraints , 2007 .

[18]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[19]  Johann Großschädl,et al.  Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.

[20]  Margaret Martonosi,et al.  Wattch: a framework for architectural-level power analysis and optimizations , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).

[21]  Jerry Avorn Technology , 1929, Nature.

[22]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[23]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[24]  Serge Vaudenay,et al.  On the Weak Keys of Blowfish , 1996, FSE.

[25]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..