Table 14 Comparative analysis of the proposed method with PRESENT, SPECK, and ChaCha20 across security, performance, memory usage, computational cost, energy consumption, and scalability. The values for PRESENT and SPECK are adapted from47, ChaCha20 from48, while the proposed method results are derived from our experimental implementation on Python 3.7 (Intel Core i5-8250U CPU, 8GB RAM). All metrics were normalised to a qualitative five-point scale (Low to Excellent) to ensure consistency in comparison.
Criteria | CAFE | PRESENT47 | SPECK47 | ChaCha2048 |
---|---|---|---|---|
Security | High | Moderate | Moderate | High |
Performance | Efficient | Fast | Fast | Good |
Memory Usage | Low | Low | Low | Moderate |
Computational Cost | Low | Low | Moderate | High |
Energy Consumption | Low | Low | Higher | High |
Scalability | Highly scalable | Scalable | Scalable | Scalable |
Best Use Case | Lightweight encryption for IoT devices | Hardware-focused embedded systems | General-purpose lightweight encryptions | Strong security for resourceful devices |