Research Article
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Table 12
Simulation results on device 3.
| ā | DES | Triple DES | AES | Blowfish |
| Encryption (paragraph-sized) | Time (milliseconds) | 7.75 | 4.95 | 0.142 | 3.38 | Key size (bytes) | 8 | 24 | 32 | 56 | Ciphertext size (characters) | 1016 | 1016 | 1024 | 1504 |
| Decryption (paragraph-sized) | Time (milliseconds) | 0.222 | 0.039 | 0.05 | 1.28 |
| Encryption (password-sized) | Time (milliseconds) | 0.227 | 0.0414 | 0.0679 | 0.529 | Key size (bytes) | 8 | 24 | 32 | 56 | Ciphertext size (characters) | 24 | 24 | 24 | 48 |
| Decryption (paragraph-sized) | Time (milliseconds) | 0.558 | 0.045 | 0.068 | 0.777 | Ciphertext size (characters) | 1016 | 1016 | 1024 | 1504 |
|
|