Skip to main content

Advances, Systems and Applications

Table 2 Comparative evaluation of encryption time

From: An enhanced encryption-based security framework in the CPS Cloud

Methods

Encryption time (ms)

RSA [22]

90

Twofish Algorithm [23]

84

ICC [24]

70

FHEA [25]

67

CBM [Proposed]

60