Research Article
A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification
Table 6
Comparison of cryptographic operations.
| ā | [1] | [5] | [6] | [7] | [8] | [3] | [9] | [25] | Purchase Credit | Making Payment |
| Symmetric Encryption | 6 | - | - | 3 | 2 | 5 | 9 | 3 | 4 | 10 |
| Asymmetric Encryption | - | 4 | 3 | 4 | 4 | - | - | 5 | - | - |
| Message Authentication Code | 3 | - | - | 3 | - | - | - | 2 | 2 | 4 |
| Hash Function | - | - | - | - | 4 | 2 | 1 | - | 2 | 3 |
| Number of Messages | 9 | 6 | 5 | 6 | 6 | 7 | 9 | 6 | 4 | 7 |
| Number of Parties | 4 | 4 | 2 | 5 | 3 | 3 | 4 | 5 | 3 | 4 |
|
|