A Scheme for Latency Analysis of Different Cryptography Methods for Security in 5G Era
Autor: | G. Mallikharjuna Rao, K. Deergha Rao |
---|---|
Rok vydání: | 2019 |
Předmět: |
Blowfish
Computer science business.industry 020206 networking & telecommunications Cryptography Data_CODINGANDINFORMATIONTHEORY 02 engineering and technology Encryption Text message 020202 computer hardware & architecture Data access 0202 electrical engineering electronic engineering information engineering Communication source Hardware_ARITHMETICANDLOGICSTRUCTURES Latency (engineering) business 5G Computer network |
Zdroj: | 2019 IEEE 5th International Conference for Convergence in Technology (I2CT). |
DOI: | 10.1109/i2ct45611.2019.9033754 |
Popis: | In this paper, we present a scheme for performance analysis of different cryptography methods namely symmetric ciphers, and asymmetric ciphers to encrypt and decrypt the text, and audio data for online secure data access in the browser window using LabVIEW approach on myRIO hardware module for 5G systems. In this work, the text message with the different payloads is encrypted and decrypted. Similarly, the same process repeated for audio data. First, the text, and audio data are converted into string format; then the data format is encrypted using different cryptography methods from the sender side. On the receiver side, same cryptography method is used to decrypt the data with a generated key associated among the parties. In the case of symmetric ciphers, AES, Blowfish, DES, and IDEA are used to encrypt and decrypt the data. Further, the asymmetric ciphers, RSA, ECC, and DSA are used to encrypt and decrypt the data. LabVIEW programming tools are used to develop a scheme of cryptography methods. Finally, latency analysis is made on text, and audio data with symmetric and asymmetric ciphers. |
Databáze: | OpenAIRE |
Externí odkaz: |