Benchmarking of Java Cryptoalgorithms

A comparison of different algorithms in different java libraries

Nonfiction, Computers, Advanced Computing, Computer Science
Cover of the book Benchmarking of Java Cryptoalgorithms by Christian Stegerer, Stefan Risse, GRIN Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christian Stegerer, Stefan Risse ISBN: 9783640315024
Publisher: GRIN Publishing Publication: April 23, 2009
Imprint: GRIN Publishing Language: English
Author: Christian Stegerer, Stefan Risse
ISBN: 9783640315024
Publisher: GRIN Publishing
Publication: April 23, 2009
Imprint: GRIN Publishing
Language: English

Seminar paper from the year 2008 in the subject Computer Science - Commercial Information Technology, grade: 1.3, University of Regensburg, language: English, abstract: Cryptographic algorithms have nowadays serious impact on many fields of modern life. A good example is the SSL technology, that consists of both symmetric as well as asymmetric cryptography. It is used in thousands of websites like online banking websites to secure transfered data. For the developers of such applications the performance of employing cryptography may be a crucial factor to the success of the complete product. Normally a software developer utilizes cryptographic operations by the usage of precast cryptographic libraries. Therefore, it is interesting to analyze the speed of cryptographic libraries which implement abstract cryptographic algorithms. In the following, we describe our benchmarking of various cryptoalgorithms in different cryptolibraries in different languages on a 32-bit system. In the first part, we outline our preparatory work and our considerations on setting up a fitting benchmarking environment. With this test environment we conducted the benchmarking of seven JAVA cryptolibraries, namely SUN-JCE, Flexiprovider, Bouncy Castle, Cryptix Crypto, IAIK-JCE, GNU crypto and RSA JSafe. Additionally, we benchmarked RSA BSafe, a cryptographic library, which is written in C++, to isolate the influence of the JAVA virtual machine abstraction layer on cryptographic performance. In the second part, we present a condensed illustration of the benchmarking results and our interpretation, for symmetric cryptography, asymmetric cryptography, the generation of hash based massage authentication codes and digital signatures. These results reveal remarkable differences in speed between the algorithms as well as between the different implementations. Also the choice of the underlying operating system has influence on the execution speed of the cryptographic code. In this work we demonstrated that software developers could gain a multiple of the execution speed of the cryptography utilizing parts of their programs just by a wise selection of cryptographic algorithms and libraries. Furthermore our work can help as a guideline for developing a generic benchmarking model for cryptoalgorithms.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Seminar paper from the year 2008 in the subject Computer Science - Commercial Information Technology, grade: 1.3, University of Regensburg, language: English, abstract: Cryptographic algorithms have nowadays serious impact on many fields of modern life. A good example is the SSL technology, that consists of both symmetric as well as asymmetric cryptography. It is used in thousands of websites like online banking websites to secure transfered data. For the developers of such applications the performance of employing cryptography may be a crucial factor to the success of the complete product. Normally a software developer utilizes cryptographic operations by the usage of precast cryptographic libraries. Therefore, it is interesting to analyze the speed of cryptographic libraries which implement abstract cryptographic algorithms. In the following, we describe our benchmarking of various cryptoalgorithms in different cryptolibraries in different languages on a 32-bit system. In the first part, we outline our preparatory work and our considerations on setting up a fitting benchmarking environment. With this test environment we conducted the benchmarking of seven JAVA cryptolibraries, namely SUN-JCE, Flexiprovider, Bouncy Castle, Cryptix Crypto, IAIK-JCE, GNU crypto and RSA JSafe. Additionally, we benchmarked RSA BSafe, a cryptographic library, which is written in C++, to isolate the influence of the JAVA virtual machine abstraction layer on cryptographic performance. In the second part, we present a condensed illustration of the benchmarking results and our interpretation, for symmetric cryptography, asymmetric cryptography, the generation of hash based massage authentication codes and digital signatures. These results reveal remarkable differences in speed between the algorithms as well as between the different implementations. Also the choice of the underlying operating system has influence on the execution speed of the cryptographic code. In this work we demonstrated that software developers could gain a multiple of the execution speed of the cryptography utilizing parts of their programs just by a wise selection of cryptographic algorithms and libraries. Furthermore our work can help as a guideline for developing a generic benchmarking model for cryptoalgorithms.

More books from GRIN Publishing

Cover of the book The Euro - Should Britain join the European Monetary Union? by Christian Stegerer, Stefan Risse
Cover of the book Will the organisational changes which are necessary for companies to become more sustainable actually happen and will they benefit the environment? by Christian Stegerer, Stefan Risse
Cover of the book Psychographic target group analysis on the basis of an empirical research for the brands Adidas, NIKE and Puma using the innovative approach of the Semiometrie by Christian Stegerer, Stefan Risse
Cover of the book Case Study 'Risk and Decision Making' by Christian Stegerer, Stefan Risse
Cover of the book Spike Lee's 'Bamboozled': The Depiction of African-Americas in US Popular Film and Television and its Traditions by Christian Stegerer, Stefan Risse
Cover of the book In what ways can environmental factors cause intellectual deficits? Can children recover from such deficits? by Christian Stegerer, Stefan Risse
Cover of the book From Book to Film: Stevenson's 'Strange Case of Dr Jekyll and Mr Hyde' (1886) and Rouben Mamoulian's Film Adaptation (1932) - a Comparison by Christian Stegerer, Stefan Risse
Cover of the book Janice Galloway's protagonists: Women in Foreign Parts discover that The Trick Is to Keep Breathing by Christian Stegerer, Stefan Risse
Cover of the book Hanif Kureishi's 'The Buddha of Suburbia' and the Topic of Racism by Christian Stegerer, Stefan Risse
Cover of the book Caryl Phillips' 'Cambridge' - The Ambiguity of a Slave's Identity through (Re)Naming by Christian Stegerer, Stefan Risse
Cover of the book Konversion und Systemtheorie by Christian Stegerer, Stefan Risse
Cover of the book The Regulation of Youth Work and Public Libraries in Municipalities in Selected European States by Christian Stegerer, Stefan Risse
Cover of the book Celebrity Scandals and their Impact on Brand Image: A Study among Young Consumers by Christian Stegerer, Stefan Risse
Cover of the book Sarah Kane's Role in the In-Yer-Face Theatre by Christian Stegerer, Stefan Risse
Cover of the book Has the Financial Crisis Induced a Credit Crunch for Small and Medium-Sized Enterprises in Germany? by Christian Stegerer, Stefan Risse
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy