Skip to main content

A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12282))

Included in the following conference series:

Abstract

The National Institute of Standards and Technology (NIST) started the standardization process for lightweight cryptography algorithms in 2018. By the end of the first round, 32 submissions have been selected as 2nd round candidates. NIST allowed designers of 2nd round submissions to provide small updates on both their specifications and implementation packages. In this work, we introduce a benchmarking framework for evaluating the performance of NIST Lightweight Cryptography (LWC) candidates on embedded platforms. We show the features and application of the framework and explain its design rationale. Moreover, we provide information on how we aim to present up-to-date performance figures throughout the NIST LWC competition. In this paper, we present an excerpt of our software benchmarking results regarding speed and memory requirements of selected ciphers. All up-to-date results, including benchmarking different test cases for multiple variants of each 2nd round algorithm on five different microcontrollers, are periodically published to a public website. While initially only the reference implementations were available, the ability of automatically testing the performance of the candidate algorithms on multiple platforms becomes especially relevant as more optimized implementations are developed. Finally, we show how the framework can be extended in different directions: support for more target platforms can be easily added, different kinds of algorithms can be tested, and other test metrics can be acquired. The focus of this paper should rather lay on the framework design and testing methodology than on the current results, especially for reference code.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/rweather/lightweight-crypto.

  2. 2.

    https://rweather.github.io/lightweight-crypto/index.html.

  3. 3.

    https://github.com/XKCP/XKCP.

References

  1. Ankele, R., Ankele, R.: Software benchmarking of the 2nd round CAESAR candidates, September 2016. https://doi.org/10.13140/RG.2.2.28074.26566

  2. Bernstein, D.J.: CAESAR: competition for authenticated encryption: security, applicability, and robustness (2014), https://competitions.cr.yp.to/caesar.html. Accessed 28 July 2019

  3. Bernstein, D.J., Lange, T.: eBACS: ECRYPT benchmarking of cryptographic systems. http://bench.cr.yp.to. Accessed 28 July 2019

  4. Cazorla, M., Gourgeon, S., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller. Secur. Commun. Netw. 8(18), 3564–3579 (2015). https://doi.org/10.1002/sec.1281. http://dx.doi.org/10.1002/sec.1281

    Article  Google Scholar 

  5. Dinu, D., Biryukov, A., Großschädl, J., Khovratovich, D., Corre, Y.L., Perrin, L.: FELICS - fair evaluation of lightweight cryptographic systems. NIST Workshop on Lightweight Cryptography (2015)

    Google Scholar 

  6. Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Großschädl, J., Biryukov, A.: Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. (2015). https://doi.org/10.1007/s13389-018-0193-x

  7. Dworkin, M.J.: NIST. no. special publication (NIST SP)-800-38D: recommendation for block cipher modes of operation: galois/counter mode (GCM) and GMAC (2007)

    Google Scholar 

  8. Hyncica, O., Kucera, P., Honzik, P., Fiedler, P.: Performance evaluation of symmetric cryptography in embedded systems. In: Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, vol. 1, pp. 277–282, September 2011. https://doi.org/10.1109/IDAACS.2011.6072756

  9. Kaps, J.P.: eXtended eXternal Benchmarking eXtension (XXBX). SPEED-B - Software performance enhancement for encryption and decryption, and benchmarking, Utrecht, Netherlands, October 2016. Invited talk

    Google Scholar 

  10. Tschofenig, H., Pegourie-Gonnard, M.: Performance of state-of-the-art cryptography on arm-based microprocessors. In: NIST Workshop on Lightweight Cryptography (2015)

    Google Scholar 

  11. Wenzel-Benner, C., Gräf, J.: XBX: external benchmarking extension for the SUPERCOP crypto benchmarking framework. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 294–305. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15031-9_20

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is supported by the Bavarian State Ministry of Science and the Arts in the framework of the Bavarian Research Institute of Digital Transformation (bidt), the PTJ and the German Federal Ministry of Economic Affairs and Energy on the basis of a decision by the German Bundestag (grant 0350042A).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sebastian Renner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Renner, S., Pozzobon, E., Mottok, J. (2020). A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. In: Meng, W., Gollmann, D., Jensen, C.D., Zhou, J. (eds) Information and Communications Security. ICICS 2020. Lecture Notes in Computer Science(), vol 12282. Springer, Cham. https://doi.org/10.1007/978-3-030-61078-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61078-4_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61077-7

  • Online ISBN: 978-3-030-61078-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics