Verwandte Artikel zu Benchmarking of Java Cryptoalgorithms: A comparison...

Benchmarking of Java Cryptoalgorithms: A comparison of different algorithms in different java libraries - Softcover

 
9783640318452: Benchmarking of Java Cryptoalgorithms: A comparison of different algorithms in different java libraries

Inhaltsangabe

Seminar paper from the year 2008 in the subject Computer Science - Commercial Information Technology, grade: 1.3, University of Regensburg, language: English, abstract: Cryptographic algorithms have nowadays serious impact on many fields of modern life. A good example is the SSL technology, that consists of both symmetric as well as asymmetric cryptography. It is used in thousands of websites like online banking websites to secure transfered data. For the developers of such applications the performance of employing cryptography may be a crucial factor to the success of the complete product. Normally a software developer utilizes cryptographic operations by the usage of precast cryptographic libraries. Therefore, it is interesting to analyze the speed of cryptographic libraries which implement abstract cryptographic algorithms. In the following, we describe our benchmarking of various cryptoalgorithms in different cryptolibraries in different languages on a 32-bit system. In the first part, we outline our preparatory work and our considerations on setting up a fitting benchmarking environment. With this test environment we conducted the benchmarking of seven JAVA cryptolibraries, namely SUN-JCE, Flexiprovider, Bouncy Castle, Cryptix Crypto, IAIK-JCE, GNU crypto and RSA JSafe. Additionally, we benchmarked RSA BSafe, a cryptographic library, which is written in C++, to isolate the influence of the JAVA virtual machine abstraction layer on cryptographic performance. In the second part, we present a condensed illustration of the benchmarking results and our interpretation, for symmetric cryptography, asymmetric cryptography, the generation of hash based massage authentication codes and digital signatures. These results reveal remarkable differences in speed between the algorithms as well as between the different implementations. Also the choice of the underlying operating system has influence on the execution speed of the cryptographic code. In this work we demonstrated

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Reseña del editor

Seminar paper from the year 2008 in the subject Computer Science - Commercial Information Technology, grade: 1.3, University of Regensburg, language: English, abstract: Cryptographic algorithms have nowadays serious impact on many fields of modern life. A good example is the SSL technology, that consists of both symmetric as well as asymmetric cryptography. It is used in thousands of websites like online banking websites to secure transfered data. For the developers of such applications the performance of employing cryptography may be a crucial factor to the success of the complete product. Normally a software developer utilizes cryptographic operations by the usage of precast cryptographic libraries. Therefore, it is interesting to analyze the speed of cryptographic libraries which implement abstract cryptographic algorithms. In the following, we describe our benchmarking of various cryptoalgorithms in different cryptolibraries in different languages on a 32-bit system. In the first part, we outline our preparatory work and our considerations on setting up a fitting benchmarking environment. With this test environment we conducted the benchmarking of seven JAVA cryptolibraries, namely SUN-JCE, Flexiprovider, Bouncy Castle, Cryptix Crypto, IAIK-JCE, GNU crypto and RSA JSafe. Additionally, we benchmarked RSA BSafe, a cryptographic library, which is written in C++, to isolate the influence of the JAVA virtual machine abstraction layer on cryptographic performance. In the second part, we present a condensed illustration of the benchmarking results and our interpretation, for symmetric cryptography, asymmetric cryptography, the generation of hash based massage authentication codes and digital signatures. These results reveal remarkable differences in speed between the algorithms as well as between the different implementations. Also the choice of the underlying operating system has influence on the execution speed of the cryptographic code. In this work we demonstrated

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

EUR 60,00 für den Versand von Deutschland nach USA

Versandziele, Kosten & Dauer

Suchergebnisse für Benchmarking of Java Cryptoalgorithms: A comparison...

Foto des Verkäufers

Stefan Risse
ISBN 10: 3640318455 ISBN 13: 9783640318452
Neu Taschenbuch

Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Taschenbuch. Zustand: Neu. Neuware -Seminar paper from the year 2008 in the subject Computer Science - Commercial Information Technology, grade: 1.3, University of Regensburg, language: English, abstract: Cryptographic algorithms have nowadays serious impact on many fields of modern life. A goodexample is the SSL technology, that consists of both symmetric as well as asymmetric cryptography. It is used in thousands of websites like online banking websites to secure transfered data. For the developers of such applications the performance of employing cryptography may be a crucial factor to the success of the complete product. Normally a software developer utilizes cryptographic operations by the usage of precast cryptographic libraries. Therefore, it is interesting to analyze the speed of cryptographic libraries which implement abstract cryptographic algorithms. In the following, we describe our benchmarking of various cryptoalgorithms in different cryptolibraries in different languages on a 32-bit system. In the first part, we outline our preparatory work and our considerations on setting up a fitting benchmarking environment. With this test environment we conducted the benchmarking of seven JAVA cryptolibraries, namely SUN-JCE, Flexiprovider, Bouncy Castle, Cryptix Crypto, IAIK-JCE, GNU crypto and RSA JSafe. Additionally, we benchmarked RSA BSafe, a cryptographic library, which is written in C++, to isolate the influence of the JAVA virtual machine abstraction layer on cryptographic performance. In the second part, we present a condensed illustration of the benchmarking results and our interpretation, for symmetric cryptography, asymmetric cryptography, the generation of hash based massage authentication codes and digital signatures. These results reveal remarkable differences in speed between the algorithms as well as between the different implementations. Also the choice of the underlying operating system has influence on the execution speed of the cryptographic code. In this work we demonstrated that software developers could gain a multiple of the execution speed of the cryptography utilizing parts of their programs just by a wise selection of cryptographic algorithms and libraries. Furthermore our work can help as a guideline for developing a generic benchmarking model for cryptoalgorithms.Books on Demand GmbH, Überseering 33, 22297 Hamburg 52 pp. Englisch. Artikel-Nr. 9783640318452

Verkäufer kontaktieren

Neu kaufen

EUR 27,95
Währung umrechnen
Versand: EUR 60,00
Von Deutschland nach USA
Versandziele, Kosten & Dauer

Anzahl: 2 verfügbar

In den Warenkorb

Foto des Verkäufers

Stefan Risse
Verlag: GRIN Verlag, 2009
ISBN 10: 3640318455 ISBN 13: 9783640318452
Neu Taschenbuch

Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Seminar paper from the year 2008 in the subject Computer Science - Commercial Information Technology, grade: 1.3, University of Regensburg, language: English, abstract: Cryptographic algorithms have nowadays serious impact on many fields of modern life. A goodexample is the SSL technology, that consists of both symmetric as well as asymmetric cryptography.It is used in thousands of websites like online banking websites to secure transfered data.For the developers of such applications the performance of employing cryptography may be acrucial factor to the success of the complete product. Normally a software developer utilizescryptographic operations by the usage of precast cryptographic libraries. Therefore, it is interestingto analyze the speed of cryptographic libraries which implement abstract cryptographicalgorithms. In the following, we describe our benchmarking of various cryptoalgorithms in differentcryptolibraries in different languages on a 32-bit system. In the first part, we outline ourpreparatory work and our considerations on setting up a fitting benchmarking environment. Withthis test environment we conducted the benchmarking of seven JAVA cryptolibraries, namelySUN-JCE, Flexiprovider, Bouncy Castle, Cryptix Crypto, IAIK-JCE, GNU crypto and RSAJSafe. Additionally, we benchmarked RSA BSafe, a cryptographic library, which is writtenin C++, to isolate the influence of the JAVA virtual machine abstraction layer on cryptographicperformance. In the second part, we present a condensed illustration of the benchmarking resultsand our interpretation, for symmetric cryptography, asymmetric cryptography, the generation ofhash based massage authentication codes and digital signatures. These results reveal remarkabledifferences in speed between the algorithms as well as between the different implementations.Also the choice of the underlying operating system has influence on the execution speed of thecryptographic code. In this work we demonstrated that software developers could gain a multipleof the execution speed of the cryptography utilizing parts of their programs just by a wise selectionof cryptographic algorithms and libraries. Furthermore our work can help as a guideline fordeveloping a generic benchmarking model for cryptoalgorithms. Artikel-Nr. 9783640318452

Verkäufer kontaktieren

Neu kaufen

EUR 27,95
Währung umrechnen
Versand: EUR 60,45
Von Deutschland nach USA
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb

Foto des Verkäufers

Stefan Risse (u. a.)
Verlag: GRIN Verlag, 2009
ISBN 10: 3640318455 ISBN 13: 9783640318452
Neu Taschenbuch

Anbieter: preigu, Osnabrück, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Taschenbuch. Zustand: Neu. Benchmarking of Java Cryptoalgorithms | A comparison of different algorithms in different java libraries | Stefan Risse (u. a.) | Taschenbuch | 52 S. | Englisch | 2009 | GRIN Verlag | EAN 9783640318452 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Artikel-Nr. 101621875

Verkäufer kontaktieren

Neu kaufen

EUR 27,95
Währung umrechnen
Versand: EUR 70,00
Von Deutschland nach USA
Versandziele, Kosten & Dauer

Anzahl: 5 verfügbar

In den Warenkorb