Table 6 Performance metrics evaluation for rank-based analysis on cryptographic techniques.
Metric | Description |
---|---|
Key size (for ~ 128-bit security) | The length of the cryptographic key required to achieve 128-bit security |
Security level | The strength of encryption against attacks. Higher values indicate stronger security |
Efficiency | The computational speed and resource usage of the encryption algorithm. Higher efficiency means faster processing |
Latency | The time required to perform encryption or decryption |
Implementation complexity | The difficulty of integrating the encryption algorithm in hardware or software |
Hardware support | The level of optimization for running specialized hardware (e.g., FPGA, ASIC) |
Resistance to side-channel attacks | The ability to withstand attacks that exploit hardware-level vulnerabilities like power consumption or timing analysis |
Scalability | The ability to efficiently support large-scale applications or increasing data loads. Higher scalability ensures adaptability to different environments |