PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices

Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cryptographic algorithm for each mobile device has become a critical factor. In this paper, we present an approach for performance evaluation of cryptographic algorithms for mobile devices. A tool called PEARL (PErformance evaluAtor of cryptogRaphic aLgorithms for mobile devices) is also introduced in this work to validate the approach. This tool collects and analyzes information related to executions of the cryptographic algorithms in the mobile devices. Moreover, PEARL allows evaluating the performance of symmetrical and asymmetrical cryptographic algorithms, and hash functions for the J2ME platform.

[1]  Duncan S. Wong,et al.  The performance measurement of cryptographic primitives on palm devices , 2001, Seventeenth Annual Computer Security Applications Conference.

[2]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Hitesh Tewari,et al.  Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[5]  Willy Susilo Securing handheld devices , 2002, Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588).