Table 5 Comparison of Cryptographic Schemes and Their Suitability for Real-Time AD-MLA Deployment on Jetson TX2.
Cryptographic scheme | Security level | Avg. Encryption + Verification Time (Jetson TX2) | Memory usage (MB) | Power usage (W) | Implementation complexity | Suitability for real-time AD-MLA |
|---|---|---|---|---|---|---|
AES-256 + SHA-256 (Used in AD-MLA) | 128–256-bit security | 15–20 ms/transaction | ≈ 10–20 MB | 5–6 W | Low | Excellent |
Elliptic Curve Cryptography (ECC-256) | 128-bit equivalent | 45–65 ms/transaction | 30–50 MB | 7–8 W | Medium | Good |
Lattice-based PQC (e.g., NTRU, Kyber) | 256-bit post-quantum | 90–130 ms/transaction | 60–80 MB | 8–9 W | High | Fair |
Homomorphic Encryption (Paillier / BFV) |  > 256-bit semantic |  > 300 ms/transaction | 150–300 MB |  > 10 W | Very High | Poor |