Benchmarking of Java Cryptoalg - Stegerer - Books - Grin Publishing - 9783640318452 - April 28, 2009
In case cover and title do not match, the title is correct

Benchmarking of Java Cryptoalg

Stegerer

Price
CA$ 40.49
excl. VAT

Ordered from remote warehouse

Expected delivery Oct 23 - Nov 4
Add to your iMusic wish list

Benchmarking of Java Cryptoalg

Seminar paper from the year 2008 in the subject Computer Science - Commercial Information Technology, grade: 1.3, University of Regensburg, language: English, abstract: Cryptographic algorithms have nowadays serious impact on many fields of modern life. A good example is the SSL technology, that consists of both symmetric as well as asymmetric cryptography. It is used in thousands of websites like online banking websites to secure transfered data. For the developers of such applications the performance of employing cryptography may be a crucial factor to the success of the complete product. Normally a software developer utilizes cryptographic operations by the usage of precast cryptographic libraries. Therefore, it is interesting to analyze the speed of cryptographic libraries which implement abstract cryptographic algorithms. In the following, we describe our benchmarking of various cryptoalgorithms in different cryptolibraries in different languages on a 32-bit system. In the first part, we outline our preparatory work and our considerations on setting up a fitting benchmarking environment. With this test environment we conducted the benchmarking of seven JAVA cryptolibraries, namely SUN-JCE, Flexiprovider, Bouncy Castle, Cryptix Crypto, IAIK-JCE, GNU crypto and RSA JSafe. Additionally, we benchmarked RSA BSafe, a cryptographic library, which is written in C++, to isolate the influence of the JAVA virtual machine abstraction layer on cryptographic performance. In the second part, we present a condensed illustration of the benchmarking results and our interpretation, for symmetric cryptography, asymmetric cryptography, the generation of hash based massage authentication codes and digital signatures. These results reveal remarkable differences in speed between the algorithms as well as between the different implementations. Also the choice of the underlying operating system has influence on the execution speed of the cryptographic code. In this work we demonstrated


Illustrations, black and white

Media Books     Book
Released April 28, 2009
ISBN13 9783640318452
Publishers Grin Publishing
Pages 52
Dimensions 148 × 210 × 3 mm   ·   90 g
Language German  

See all of Stegerer ( e.g. Book )