Skip to main content
. 2025 Aug 22;15:30867. doi: 10.1038/s41598-025-01315-5

Table 3.

Computational efficiency comparison.

Encryption model Computational overhead Energy efficiency Processing speed Suitability for high-volume data Suitability for real-tisme processing
SymECCipher Low High Very High Excellent Excellent
RSA-2048 High Moderate Low Poor Poor
AES-256 Moderate High High Excellent Very Good
ECC-256 Low High High Very Good Excellent
Blowfish Moderate High High Very Good Very Good
Twofish Moderate High High Very Good Very Good
Serpent Moderate High Moderate Good Good
IDEA High Moderate Moderate Moderate Moderate
3DES High Low Low Poor Poor
Camellia Moderate High High Very Good Very Good
CAST-128 Moderate High High Good Very Good