A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices

With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices’ security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and shoul...

Full description

Bibliographic Details
Main Authors: Aleksandr Ometov, Krystof Zeman, Pavel Masek, Lukas Balazevic, Mikhail Komarov
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9389752/
id doaj-962e1df6a65e40d595379a261ee9dc3d
record_format Article
spelling doaj-962e1df6a65e40d595379a261ee9dc3d2021-04-13T23:00:26ZengIEEEIEEE Access2169-35362021-01-019546255463810.1109/ACCESS.2021.30696279389752A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android DevicesAleksandr Ometov0https://orcid.org/0000-0003-3412-1639Krystof Zeman1https://orcid.org/0000-0002-6738-7305Pavel Masek2https://orcid.org/0000-0003-2976-6547Lukas Balazevic3Mikhail Komarov4https://orcid.org/0000-0001-7075-0016Tampere University, Tampere, FinlandBrno University of Technology, Brno, Czech RepublicBrno University of Technology, Brno, Czech RepublicBrno University of Technology, Brno, Czech RepublicNational Research University Higher School of Economics, Moscow, RussiaWith technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices’ security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. This paper analyzes the security mechanisms applied for internal use in the Android OS and the communication between the Android OS and the remote server. Presented work aims to examine these mechanisms and evaluate which cryptographic methods and procedures are most advantageous in terms of energy efficiency derived from execution time. Nonetheless, the dataset with the measurements collected from 17 mobile devices and the code for reproducibility is also provided. After analyzing the collected data, specific cryptographic algorithms are recommended to implement an application that utilizes native cryptographic operations on modern Android devices. In particular, selected algorithms for symmetric encryption are AES256 / GCM / No Padding; for digital signature – SHA512 with RSA2048 / PSS, and for asymmetric encryption – RSA3072 / OAEP with SHA512 and MGF1 Padding.https://ieeexplore.ieee.org/document/9389752/Cryptographic protocolssoftware measurementinformation securitycellular phoneswearable computers
collection DOAJ
language English
format Article
sources DOAJ
author Aleksandr Ometov
Krystof Zeman
Pavel Masek
Lukas Balazevic
Mikhail Komarov
spellingShingle Aleksandr Ometov
Krystof Zeman
Pavel Masek
Lukas Balazevic
Mikhail Komarov
A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
IEEE Access
Cryptographic protocols
software measurement
information security
cellular phones
wearable computers
author_facet Aleksandr Ometov
Krystof Zeman
Pavel Masek
Lukas Balazevic
Mikhail Komarov
author_sort Aleksandr Ometov
title A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
title_short A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
title_full A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
title_fullStr A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
title_full_unstemmed A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
title_sort comprehensive and reproducible comparison of cryptographic primitives execution on android devices
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices’ security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. This paper analyzes the security mechanisms applied for internal use in the Android OS and the communication between the Android OS and the remote server. Presented work aims to examine these mechanisms and evaluate which cryptographic methods and procedures are most advantageous in terms of energy efficiency derived from execution time. Nonetheless, the dataset with the measurements collected from 17 mobile devices and the code for reproducibility is also provided. After analyzing the collected data, specific cryptographic algorithms are recommended to implement an application that utilizes native cryptographic operations on modern Android devices. In particular, selected algorithms for symmetric encryption are AES256 / GCM / No Padding; for digital signature – SHA512 with RSA2048 / PSS, and for asymmetric encryption – RSA3072 / OAEP with SHA512 and MGF1 Padding.
topic Cryptographic protocols
software measurement
information security
cellular phones
wearable computers
url https://ieeexplore.ieee.org/document/9389752/
work_keys_str_mv AT aleksandrometov acomprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT krystofzeman acomprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT pavelmasek acomprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT lukasbalazevic acomprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT mikhailkomarov acomprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT aleksandrometov comprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT krystofzeman comprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT pavelmasek comprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT lukasbalazevic comprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
AT mikhailkomarov comprehensiveandreproduciblecomparisonofcryptographicprimitivesexecutiononandroiddevices
_version_ 1721528483551641600