Evaluating the Impact of Cryptographic Algorithms on Network Performance

Evaluating the Impact of Cryptographic Algorithms on Network Performance

Samuel Asare, Winfred Yaokumah, Ernest Barfo Boadi Gyebi, Jamal-Deen Abdulai
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJCAC.309937
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cryptographic algorithms enable secure data communication over public insecure networks. Though they enhance network security, complex cryptographic operations consume substantial amounts of computing resources, introducing significant network overhead costs. This study aims to find the cryptographic algorithm that can efficiently utilize network resources. The study evaluates three cryptographic algorithms with different file formats on varying numbers of node densities. The NS-3 simulator was used to measure latency, data throughput, end-to-end delay, packet delivery ratio, and packet loss of files in text, image, and audio formats. The results find AES as better than DES and 3DES for a large number of node densities for the three file formats in terms of latency, data throughput, end-to-end delay, and packet delivery ratio. However, DES has the lowest packet loss as AES records the highest packet loss. The findings provide researchers avenues for further research and the practitioners the choice of suitable algorithms based on the overhead performance.
Article Preview
Top

Introduction

The rapid growth in the development of complex cryptographic algorithms coupled with the variety and volume of data traversing the global network in a distributed systems environment raises the issue of network performance (Unal et al., 2021). Cryptographic algorithms are methods used to ensure confidentiality, authenticity, and data integrity (Kumari, 2017). Cryptographic algorithms enable secure data communication over public insecure networks (Rojasree & Gnanajayanthi, 2020) by hiding the original information from the intruder (Pal, Datta, & Karmakar, 2022). Though cryptographic algorithms enhance network security (Makarenko et al., 2020; Jing et al., 2014), cryptographic operations consume substantial amounts of computing resources (Patil et al., 2016). This leads to significant overhead costs in resource-bounded systems (Braeken, 2022; Laszka, Vorobeychik, & Koutsoukos, 2018), such as in computer networks. Overhead costs are introduced because cryptographic algorithms depend on complex arithmetic computational functions to perform their operations. Therefore, the encryption and decryption time, execution time, running time, key strength, and memory affect the overall performance of the network (Mushtaq et al., 2017).

Besides, the usage of cryptographic methods on computer networks introduces significant communication overhead cost (Braeken, 2022), which includes data throughput, end-to-end delay, data loss, memory usage, and latency (Gueron, 2016). Similarly, communication networks also have computational complexities, inefficient security, reduced throughput, and increased delay (Mohindra & Gandhi, 2021). In this regard, previous works analyse the efficiency of cryptographic algorithms in various contexts. Notable among them are the evaluation of image files with AES (Elhoseny et al., 2020; Shaktawat et al., 2020) and the encryption of text files (Jintcharadze et al., 2021; Pal, Datta, & Karmakar, 2022). Other studies assess the power utilization, different key sizes, CPU utilization time, and the encryption speed of each of the algorithms (Parkar et al., 2021; Fazzat et al., 2020).

These studies focus on a specific data format (image only, text only, video, or audio only) or networks with specified node densities or stand-only systems. However, the overhead performance of these algorithms may differ on networks with different file formats (Zhang & Liu, 2021). This study implements and evaluates popularly used cryptographic algorithms DES, 3DES, and AES to show their overall communication overhead performance with a varying number of nodes with different file formats. Thus, this study aims to find the cryptographic algorithm that can effectively and efficiently utilize network resources. Specifically, this study (a) investigates the impact of DES, 3DES, and AES cryptographic algorithms on throughput, (b) ascertain the effect of the cryptographic algorithms on end-to-end delay, (c) examines the impact of the cryptographic algorithms on latency, (d) investigates the packet delivery ratios of the cryptographic algorithms.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing