Table 1: Typical speeds of encryption and authentication. (*We include RC4 only for purposes of speed comparison. There are cryptographic attacks on RC4, and its security is not comparable to the other algorithms in this table.)
Back to Article