Research Article
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Table 11
Simulation results on device 2.
| ā | DES | Triple DES | AES | Blowfish |
| Encryption (paragraph-sized) | Time (milliseconds) | 4.0 | 1.277 | 0.162 | 1.523 | Key size (bytes) | 8 | 24 | 32 | 56 | Ciphertext size (characters) | 1016 | 1016 | 1024 | 1504 | Decryption (paragraph-sized) | Time (milliseconds) | 0.773 | 0.0236 | 0.0256 | 0.561 | Encryption (password-sized) | Time (milliseconds) | 0.961 | 0.0209 | 0.0253 | 0.174 | Key size (bytes) | 8 | 24 | 32 | 56 | Ciphertext size (characters) | 24 | 24 | 24 | 48 | Decryption (password-sized) | Time (milliseconds) | 1.249 | 0.0183 | 0.0277 | 0.188 |
|
|