A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F21%3APU140514" target="_blank" >RIV/00216305:26220/21:PU140514 - isvavai.cz</a>
Výsledek na webu
<a href="https://ieeexplore.ieee.org/document/9389752" target="_blank" >https://ieeexplore.ieee.org/document/9389752</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/ACCESS.2021.3069627" target="_blank" >10.1109/ACCESS.2021.3069627</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
Popis výsledku v původním jazyce
With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices' security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. This paper analyzes the security mechanisms applied for internal use in the Android OS and the communication between the Android OS and the remote server. Presented work aims to examine these mechanisms and evaluate which cryptographic methods and procedures are most advantageous in terms of energy efficiency derived from execution time. Nonetheless, the dataset with the measurements collected from 17 mobile devices and the code for reproducibility is also provided. After analyzing the collected data, specific cryptographic algorithms are recommended to implement an application that utilizes native cryptographic operations on modern Android devices. In particular, selected algorithms for symmetric encryption are AES256 / GCM / No Padding; for digital signature -- SHA512 with RSA2048 / PSS, and for asymmetric encryption - RSA3072 / OAEP with SHA512 and MGF1 Padding.
Název v anglickém jazyce
A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
Popis výsledku anglicky
With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices' security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. This paper analyzes the security mechanisms applied for internal use in the Android OS and the communication between the Android OS and the remote server. Presented work aims to examine these mechanisms and evaluate which cryptographic methods and procedures are most advantageous in terms of energy efficiency derived from execution time. Nonetheless, the dataset with the measurements collected from 17 mobile devices and the code for reproducibility is also provided. After analyzing the collected data, specific cryptographic algorithms are recommended to implement an application that utilizes native cryptographic operations on modern Android devices. In particular, selected algorithms for symmetric encryption are AES256 / GCM / No Padding; for digital signature -- SHA512 with RSA2048 / PSS, and for asymmetric encryption - RSA3072 / OAEP with SHA512 and MGF1 Padding.
Klasifikace
Druh
J<sub>imp</sub> - Článek v periodiku v databázi Web of Science
CEP obor
—
OECD FORD obor
20203 - Telecommunications
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2021
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
IEEE Access
ISSN
2169-3536
e-ISSN
—
Svazek periodika
9
Číslo periodika v rámci svazku
1
Stát vydavatele periodika
US - Spojené státy americké
Počet stran výsledku
14
Strana od-do
54625-54638
Kód UT WoS článku
000641005200001
EID výsledku v databázi Scopus
2-s2.0-85103792301