International Journal of Computer Applications
As the Internet grows rapidly, role of security of information of users gain more importance than ever. Key exchange protocols are important in this regard. In this paper, the authors evaluate performance of well known key exchange algorithms. In this paper, they analyze their encryption speed and their power consumption on different platforms. They analyze algorithms on both traditional PC and mobile phones. Experiment result shows that protocols which are less computationally intensive and less power consuming but not very secure. They select the protocol which is most suitable for mobile computers.