Show simple item record

dc.contributor.authorOmetov, Aleksandrcs
dc.contributor.authorZeman, Kryštofcs
dc.contributor.authorMašek, Pavelcs
dc.contributor.authorBalaževič, Lukášcs
dc.contributor.authorKomarov, Mikhailcs
dc.date.accessioned2021-11-15T11:55:31Z
dc.date.available2021-11-15T11:55:31Z
dc.date.issued2021-04-01cs
dc.identifier.citationIEEE Access. 2021, vol. 9, issue 1, p. 54625-54638.en
dc.identifier.issn2169-3536cs
dc.identifier.other171029cs
dc.identifier.urihttp://hdl.handle.net/11012/202270
dc.description.abstractWith technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices' security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. This paper analyzes the security mechanisms applied for internal use in the Android OS and the communication between the Android OS and the remote server. Presented work aims to examine these mechanisms and evaluate which cryptographic methods and procedures are most advantageous in terms of energy efficiency derived from execution time. Nonetheless, the dataset with the measurements collected from 17 mobile devices and the code for reproducibility is also provided. After analyzing the collected data, specific cryptographic algorithms are recommended to implement an application that utilizes native cryptographic operations on modern Android devices. In particular, selected algorithms for symmetric encryption are AES256 / GCM / No Padding; for digital signature -- SHA512 with RSA2048 / PSS, and for asymmetric encryption - RSA3072 / OAEP with SHA512 and MGF1 Padding.en
dc.formattextcs
dc.format.extent54625-54638cs
dc.format.mimetypeapplication/pdfcs
dc.language.isoencs
dc.publisherIEEEcs
dc.relation.ispartofIEEE Accesscs
dc.relation.urihttps://ieeexplore.ieee.org/document/9389752cs
dc.rightsCreative Commons Attribution 4.0 Internationalcs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectCryptographic protocolsen
dc.subjectSoftware measurementen
dc.subjectInformation securityen
dc.subjectCellular phonesen
dc.subjectWearable computersen
dc.titleA Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devicesen
thesis.grantorVysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikacícs
sync.item.dbidVAV-171029en
sync.item.dbtypeVAVen
sync.item.insts2021.11.15 12:55:31en
sync.item.modts2021.11.15 12:15:53en
dc.coverage.issue1cs
dc.coverage.volume9cs
dc.identifier.doi10.1109/ACCESS.2021.3069627cs
dc.rights.accessopenAccesscs
dc.rights.sherpahttp://www.sherpa.ac.uk/romeo/issn/2169-3536/cs
dc.type.driverarticleen
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Creative Commons Attribution 4.0 International
Except where otherwise noted, this item's license is described as Creative Commons Attribution 4.0 International