EconPapers    
Economics at your fingertips  
 

Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time

Walid Y. Zibideh and Mustafa M. Matalgah
Additional contact information
Walid Y. Zibideh: Qualcomm, San Diego, CA, USA
Mustafa M. Matalgah: Department of Electrical Engineering, University of Mississippi, University, MS, USA

International Journal of Information Security and Privacy (IJISP), 2013, vol. 7, issue 1, 63-75

Abstract: A secure cryptosystem could be very complicated, time consuming and hard to implement. Therefore, the complexity of the cryptosystem should be taken into account during design and implementation. In this work, the authors introduce a comprehensive and platform independent complexity analysis for a class of symmetric block cryptosystems, by which it will be easier to evaluate the performance of some used cryptosystems. Previous works lacked the comprehensiveness in their analysis, due to the fact that the memory access time was completely ignored, which greatly degrades the accuracy of the analysis and limits it to one data block only. In this paper the authors analytically compute the complexity for a class of symmetric cryptosystems in terms of the number of the clock cycles required and in terms of the required time for encryption/decryption, independently of the hardware or software used in the encryption/decryption process. Moreover, this is the first complexity analysis that considers the required time to access and retrieve information from memory, which makes the analysis more comprehensive and accurate than previous work as well as being general for any number of encryption data blocks. In addition, computer simulations are used to truly evaluate the accuracy of the analysis and to show how the analytical results match the simulation results.

Date: 2013
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jisp.2013010105 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:7:y:2013:i:1:p:63-75

Access Statistics for this article

International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh

More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jisp00:v:7:y:2013:i:1:p:63-75