Evaluation of Lightweight Block Ciphers for Embedded Systems
Ubiquitous Computing and the Internet of Things are two paradigms which have gained a lot of popularity lately. They are based on a multitude of low power devices which usually communicate through wireless connections. To avoid security and reliability problems, efficient cryptographic algorithms must be used for authentication, key exchange and message encryption. Due to the wide range of such algorithms and their characteristics, some ciphers are more suitable for implementation on certain platforms than others. In this paper we propose solutions for the implementation and evaluation of block ciphers on 8-bit, 16-bit and 32-bit microcontrollers. We focus on widely used algorithms such as AES (the tinyAES implementation), as well as others which are suitable for embedded platforms, such as the Simon and Speck family of block ciphers. The conclusions of this paper are drawn based on the performance and energy efficiency of each algorithm.
KeywordsBlock ciphers Embedded systems Cryptographic algorithms Simon and Speck
The work has been funded by the “Sectoral Operational Programme Human Resources Development 2007–2013 of the Ministry of European Funds” through the Financial Agreements POSDRU/159/1.5/S/134398 and POSDRU 187/ 1.5/S/155420.
This research presented is also supported by the project clueFarm: Information system based on cloud services accessible through mobile devices, to increase product quality and business development farms - PN-II-PT-PCCA-2013-4-0870.
- 1.Lee, H., Lee, K., Shin, Y.: AES implementation and performance evaluation on 8-bit microcontrollers, arXiv preprint (2009). arXiv:0911.0482
- 3.Buttyan, L., Hubaux, J.-P.: Security and cooperation in wireless networks. In: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press (2007)Google Scholar
- 4.Blumenthal, U., Maino, F., McCloghrie, K.: The advanced encryption standard (AES) cipher algorithm in the SNMP user-based security model. Internet proposed standard RFC 3826 (2004)Google Scholar
- 5.Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. In: 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools, DSD 2006, pp. 577–583. IEEE (2006)Google Scholar
- 6.Passow, P., Stoll, N., Junginger, S., Thurow, K.: A wireless sensor node for long-term monitoring in life science applications. In: IEEE International Instrumentation and Measurement Technology Conference (I2MTC 2013), pp. 898–901. IEEE (2013)Google Scholar
- 8.Dalmisli, K.V., Ors, B.: Design of new tiny circuits for AES encryption algorithm. In: 3rd International Conference on Signals, Circuits and Systems (SCS 2009), pp. 1–5. IEEE (2009)Google Scholar
- 9.Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers. IACR Cryptology ePrint Archive 2013, p. 404 (2013)Google Scholar
- 10.Beaulieu, R., Douglas S., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers (2015)Google Scholar
- 15.Bogdanov, A.: Analysis and design of block cipher constructions. Europischer Univ.-Verlag (2010)Google Scholar
- 18.Murphy, S.: The power of NISTs statistical testing of AES candidates. Preprint, 17 January 2000Google Scholar
- 19.Soto, J.: Randomness testing of the AES candidate algorithms. In: NIST (1999). csrc.nist.gov
- 21.Gneysu, T., Pfeiffer, G., Paar, C., Schimmler, M.: Three years of evolution: cryptanalysis with COPACOBANA. In: Workshop Record of SHARCS (2009)Google Scholar