Table 3.
Computational efficiency comparison.
| Encryption model | Computational overhead | Energy efficiency | Processing speed | Suitability for high-volume data | Suitability for real-tisme processing |
|---|---|---|---|---|---|
| SymECCipher | Low | High | Very High | Excellent | Excellent |
| RSA-2048 | High | Moderate | Low | Poor | Poor |
| AES-256 | Moderate | High | High | Excellent | Very Good |
| ECC-256 | Low | High | High | Very Good | Excellent |
| Blowfish | Moderate | High | High | Very Good | Very Good |
| Twofish | Moderate | High | High | Very Good | Very Good |
| Serpent | Moderate | High | Moderate | Good | Good |
| IDEA | High | Moderate | Moderate | Moderate | Moderate |
| 3DES | High | Low | Low | Poor | Poor |
| Camellia | Moderate | High | High | Very Good | Very Good |
| CAST-128 | Moderate | High | High | Good | Very Good |