Performance Analysis of a Tool for the Visualization of Hashes on Mobile Devices

Abstract


A security application that enhances communication privacy must have a performance that ensures its usability without compromising the reservation of scarce resources, especially on mobile devices. Among such security applications, those such as hashify stand out, which manipulate or generate animations from cryptographic hashes. This paper presents the performance analysis of hashify, measuring the time taken to draw animations and evaluating memory and network consumption. Preliminary results obtained from an Android device showed that the images generated by the software are drawn, on average, in 22.6ms, a relatively low time showing that hashify can be integrated into mobile applications.

Keywords: Security, Cryptographic Hashes, Visual Hashes, Performance

References

Davis, C. (2011). RoboHash. https://robohash.org/. Acessado em 23/07/2021.

Google (2020a). Renderização lenta. https://developer.android.com/topic/performance/vitals/render. Acessado em 22/07/2021.

Google (2020b). Visão geral do rastreamento do sistema. https://developer.android.com/topic/performance/tracing. Acessado em 12/07/2021.

Google (2021a). Perfetto - System profiling, app tracing and trace analysis. https://perfetto.dev/. Acessado em 12/07/2021.

Google (2021b). Track events (Tracing SDK). https://perfetto.dev/docs/instrumentation/track-events. Acessado em 22/07/2021.

Jain, R., Molnar, D., and Ramzan, Z. (2005). Towards a Model of Energy Complexity for Algorithms [Mobile Wireless Applications]. In IEEE Wireless Communications and Networking Conference, 2005, volume 3, pages 1884–1890.

Maina Olembo, M., Kilian, T., Stockhardt, S., Hülsing, A., and Volkamer, M. (2014). Developing and Testing SCoP–a Visual Hash Scheme. Information Management & Computer Security, 22(4):382–392.

Perrig, A. and Song, D. (1999). Hash Visualization: a New Technique to Improve RealWorld Security. In CryTEC ’99.

Ribeiro, J. M., Batista, D. M., and de Pina, J. C. (2020). hashify: Uma Ferramenta para Visualização de Hashes com Animações. In Anais do Salão de Ferramentas do SBSeg.

Roy, S., Rudra, A., and Verma, A. (2013). An Energy Complexity Model for Algorithms. In 4th Conference on Innovations in Theoretical Computer Science, page 283–304.

Tan, J., Bauer, L., Bonneau, J., Cranor, L. F., Thomas, J., and Ur, B. (2017). Can Unicorns Help Users Compare Crypto Key Fingerprints? In ACM CHI’17, pages 3787–3798.
Published
2021-10-04
CARVALHO, Henrique Araújo de; RIBEIRO, Jorge Miguel; BATISTA, Daniel Macêdo; PINA, José Coelho de. Performance Analysis of a Tool for the Visualization of Hashes on Mobile Devices. In: WORKSHOP ON SCIENTIFIC INITIATION AND UNDERGRADUATE WORKS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 21. , 2021, Evento Online. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2021 . p. 248-255. DOI: https://doi.org/10.5753/sbseg_estendido.2021.17357.

Most read articles by the same author(s)

1 2 > >>