Abstract
This article explores the design space of secure communication in ultra-low-energy IoT devices based on Micro-Controller Units (MCUs). It tries to identify, benchmark, and compare security-related design choices in a Commercial-Off-The-Shelf (COTS) embedded IoT system which contributes to the energy consumption. We conduct a study over a large group of software crypto algorithms: symmetric, stream, hash, AEAD, MAC, digital signature, and key exchange. A comprehensive report of the targeted optimization attributes (memory, performance, and specifically energy) will be presented from over 450 experiments and 170 different crypto source codes. The article also briefly explores a few system-related choices which can affect the energy consumption of secure communication, namely, architecture choice, communication bandwidth, signal strength, and processor frequency. In the end, the article gives an overview of the obtained results and the contribution of all. Finally, it shows, in a case study, how the results could be utilized to have a secure communication in an exemplary IoT device. This article gives IoT designers insight into ultra-low-energy security, helps them to choose appropriate cryptographic algorithms, reduce trial-and-error of alternatives, save effort, and hence cut the design costs.
- Amy Nordrum et al. 2016. Popular internet of things forecast of 50 billion devices by 2020 is outdated. IEEE Spectrum 18 (2016).Google Scholar
- Jiayu Li, Ji HoonHyun, and Dong SamHa. 2018. A multi-source energy harvesting system to power microcontrollers for cryptography. In 44th Annual Conference of the IEEE Industrial Electronics Society (IECON’18). IEEE, 901--906.Google Scholar
Cross Ref
- Suranga Seneviratne, Yining Hu, Tham Nguyen, Guohao Lan, Sara Khalifa, Kanchana Thilakarathna, Mahbub Hassan, and Aruna Seneviratne. 2017. A survey of wearable devices and challenges. IEEE Communications Surveys 8 Tutorials 19, 4 (2017), 2573--2620.Google Scholar
Cross Ref
- Achraf Amar, Ammar Kouki, and Hung Cao. 2015. Power approaches for implantable medical devices. Sensors 15, 11 (2015), 28889--28914.Google Scholar
Cross Ref
- Arsalan Mosenia and Niraj K. Jha. 2017. A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing 5, 4 (2017), 586--602.Google Scholar
Cross Ref
- Sergey Panasenko and Sergey Smagin. 2011. Lightweight cryptography: Underlying principles and approaches. International Journal of Computer Theory and Engineering 3, 4 (2011), 516.Google Scholar
Cross Ref
- Charles Suslowicz, Archanaa S. Krishnan, and Patrick Schaumont. 2017. Optimizing cryptography in energy harvesting applications. In Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security. ACM, 17--26.Google Scholar
Digital Library
- Guanglou Zheng, Rajan Shankaran, Mehmet A. Orgun, Li Qiao, and Kashif Saleem. Ideas and challenges for securing wireless implantable medical devices: A review. IEEE Sensors Journal 17, 3 ([n.d.]), 562--576.Google Scholar
- Github Cipher Sources. ([n.d.]).Google Scholar
- Carles Gomez, Joaquim Oller, and Josep Paradells. 2012. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 12, 9 (2012), 11734--11753.Google Scholar
Cross Ref
- Vincent Rijmen and Joan Daemen. 2001. Advanced encryption standard. Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology (2001), 19--22.Google Scholar
- Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, and Mahmoud Modarres-Hashemi. 2010. Improved impossible differential cryptanalysis of 7-round AES-128. In International Conference on Cryptology in India. Springer, 282--291.Google Scholar
Cross Ref
- Alex Biryukov and Dmitry Khovratovich. 2009. Related-key cryptanalysis of the full AES-192 and AES-256. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 1--18.Google Scholar
Digital Library
- Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger. 2011. Biclique cryptanalysis of the full AES. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 344--371.Google Scholar
Digital Library
- Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, and Toshio Tokita. 2001. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design and Analysis. Springer, Berlin, 39--56. DOI:http://dx.doi.org/10.1007/3-540-44983-3_4Google Scholar
- Dongxia Bai and Leibo Li. 2012. New impossible differential attacks on camellia. In International Conference on Information Security Practice and Experience. Springer, 80--96.Google Scholar
Digital Library
- Alex Biryukov and Ivica Nikolic. Security analysis of the block cipher Camellia. ([n.d.]).Google Scholar
- Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata. 2007. The 128-Bit Blockcipher CLEFIA (Extended Abstract). Springer, Berlin, 181--195. DOI:http://dx.doi.org/10.1007/978-3-540-74619-5_12Google Scholar
- Yanjun Li, Wenling Wu, and Lei Zhang. 2011. Improved integral attacks on reduced-round CLEFIA block cipher. In International Workshop on Information Security Applications. Springer, 28--39.Google Scholar
- Cihangir Tezcan. 2010. The improbable differential attack: Cryptanalysis of reduced round CLEFIA. In International Conference on Cryptology in India. Springer, 197--209.Google Scholar
Cross Ref
- Gregor Leander, Christof Paar, Axel Poschmann, and Kai Schramm. 2007. New Lightweight DES Variants. Springer, Berlin, 196--210. DOI:http://dx.doi.org/10.1007/978-3-540-74619-5_13Google Scholar
- Nicolas T. Courtois. 2012. Security evaluation of GOST 28147-89 in view of international standardisation. Cryptologia 36, 1 (2012), 2--13. DOI:http://dx.doi.org/10.1080/01611194.2011.632807Google Scholar
Cross Ref
- Itai Dinur, Orr Dunkelman, and Adi Shamir. 2012. Improved attacks on full GOST. In International Workshop on Fast Software Encryption. Springer, 9--28.Google Scholar
Digital Library
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, and Seongtaek Chee. 2006. HIGHT: A New Block Cipher Suitable for Low-Resource Device. Springer, Berlin, 46--59. DOI:http://dx.doi.org/10.1007/11894063_4Google Scholar
- Deukjo Hong, Bonwook Koo, and Daesung Kwon. 2011. Biclique attack on the full HIGHT. In International Conference on Information Security and Cryptology. Springer, 365--374.Google Scholar
- Bonwook Koo, Deukjo Hong, and Daesung Kwon. 2010. Related-key attack on the full HIGHT. In International Conference on Information Security and Cryptology. Springer, 49--67.Google Scholar
- Onur Özen, Kerem Varıcı, Cihangir Tezcan, and Çelebi Kocair. 2009. Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT. In Australasian Conference on Information Security and Privacy. Springer, 90--107.Google Scholar
Digital Library
- Peng Zhang, Bing Sun, and Chao Li. 2009. Saturation attack on the block cipher HIGHT. In International Conference on Cryptology and Network Security. Springer, 76--86.Google Scholar
Digital Library
- Francois-Xavier Standaert, Gilles Piret, Gael Rouvroy, Jean-Jacques Quisquater, and Jean-Didier Legat. 2004. ICEBERG: An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. Springer, Berlin, 279--298. DOI:http://dx.doi.org/10.1007/978-3-540-25937-4_18Google Scholar
- Yue Sun. 2012. Linear cryptanalysis of light-weight block cipher ICEBERG. In Advances in Electronic Commerce, Web Application and Communication. Springer, 529--532.Google Scholar
- Yue Sun, Meiqin Wang, Shujia Jiang, and Qiumei Sun. 2012. Differential cryptanalysis of reduced-round ICEBERG. In International Conference on Cryptology in Africa. Springer, 155--171.Google Scholar
Digital Library
- Xuejia Lai and James L. Massey. 1991. A Proposal for a New Block Encryption Standard. Springer, Berlin, 389--404. DOI:http://dx.doi.org/10.1007/3-540-46877-3_35Google Scholar
- John Kelsey, Bruce Schneier, and David Wagner. 1996. Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des. In Annual International Cryptology Conference. Springer, 237--251.Google Scholar
Cross Ref
- Eli Biham, Alex Biryukov, and Adi Shamir. 1999. Miss in the middle attacks on IDEA and Khufu. In International Workshop on Fast Software Encryption. Springer, 124--138.Google Scholar
Cross Ref
- Ferhat Karakoç, Hüseyin Demirci, and A. Emre Harmancı. 2013. ITUbee: A Software Oriented Lightweight Block Cipher. Springer, Berlin, 16--27. DOI:http://dx.doi.org/10.1007/978-3-642-40392-7_2Google Scholar
- Hadi Soleimany. 2014. Self-similarity cryptanalysis of the block cipher ITUbee. IET Information Security 9, 3 (2014), 179--184.Google Scholar
Digital Library
- Christophe De Cannière, Orr Dunkelman, and Miroslav Knežević. 2009. KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers. Springer, Berlin, 272--288. DOI:http://dx.doi.org/10.1007/978-3-642-04138-9_20Google Scholar
- Martin R. Albrecht and Gregor Leander. 2012. An all-in-one approach to differential cryptanalysis for small block ciphers. In International Conference on Selected Areas in Cryptography. Springer, 1--15.Google Scholar
- Bo Zhu and Guang Gong. 2014. Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. Cryptography and Communications 6, 4 (2014), 313--333.Google Scholar
Digital Library
- Andrey Bogdanov and Christian Rechberger. 2010. A 3-subset meet-in-the-middle attack: Cryptanalysis of the lightweight block cipher KTANTAN. In International Workshop on Selected Areas in Cryptography. Springer, 229--240.Google Scholar
- Souvik Kolay and Debdeep Mukhopadhyay. 2014. Khudra: A New Lightweight Block Cipher for FPGAs. Springer International Publishing, Cham, 126--145. DOI:http://dx.doi.org/10.1007/978-3-319-12060-7_9Google Scholar
- Qianqian Yang, Lei Hu, Siwei Sun, and Ling Song. 2016. Related-key impossible differential analysis of full Khudra. In International Workshop on Security. Springer, 135--146.Google Scholar
Cross Ref
- Xiaoshuang Ma and Kexin Qiao. 2015. Related-key rectangle attack on round-reduced Khudra block cipher. In International Conference on Network and System Security. Springer, 331--344.Google Scholar
Cross Ref
- Zheng Gong, Svetla Nikova, and Yee Wei Law. 2012. KLEIN: A New Family of Lightweight Block Ciphers. Springer, Berlin, 1--18. DOI:http://dx.doi.org/10.1007/978-3-642-25286-0_1Google Scholar
- Jean-Philippe Aumasson, María Naya-Plasencia, and Markku-Juhani O. Saarinen. 2011. Practical attack on 8 rounds of the lightweight block cipher KLEIN. In International Conference on Cryptology in India. Springer, 134--145.Google Scholar
- Virginie Lallemand and María Naya-Plasencia. 2014. Cryptanalysis of KLEIN (Full version). IACR Cryptology ePrint Archive 2014 (2014), 90.Google Scholar
- Wenling Wu and Lei Zhang. 2011. LBlock: A Lightweight Block Cipher. Springer, Berlin, 327--344. DOI:http://dx.doi.org/10.1007/978-3-642-21554-4_19Google Scholar
- Christina Boura, Marine Minier, María Naya-Plasencia, and Valentin Suder. 2014. Improved Impossible Differential Attacks Against Round-Reduced LBlock. Ph.D. dissertation. IACR Cryptology ePrint Archive.Google Scholar
- Yu Sasaki and Lei Wang. 2012. Comprehensive study of integral analysis on 22-round LBlock. In International Conference on Information Security and Cryptology. Springer, 156--169.Google Scholar
- Hadi Soleimany and Kaisa Nyberg. 2014. Zero-correlation linear cryptanalysis of reduced-round LBlock. Designs, Codes and Cryptography 73, 2 (2014), 683--698.Google Scholar
Digital Library
- Ya Liu, Dawu Gu, Zhiqiang Liu, and Wei Li. 2012. Impossible differential attacks on reduced-round LBlock. In International Conference on Information Security Practice and Experience. Springer, 97--108.Google Scholar
Digital Library
- Marine Minier and María Naya-Plasencia. 2012. A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. Information Processing Letters 112, 16 (2012), 624--629.Google Scholar
Digital Library
- Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, and Dong-Geon Lee. 2014. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. Springer International Publishing, Cham, 3--27. DOI:http://dx.doi.org/10.1007/978-3-319-05149-9_1Google Scholar
- Ling Song, Zhangjie Huang, and Qianqian Yang. 2016. Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. In Australasian Conference on Information Security and Privacy. Springer, 379--394.Google Scholar
Digital Library
- Ashutosh Dhar Dwivedi and Gautam Srivastava. 2018. Differential cryptanalysis of round-reduced LEA. IEEE Access 6 (2018), 79105--79113.Google Scholar
- Jian Guo, Thomas Peyrin, Axel Poschmann, and Matt Robshaw. 2011. The LED Block Cipher. Springer, Berlin, 326--341. DOI:http://dx.doi.org/10.1007/978-3-642-23951-9_22Google Scholar
- Zhihao Jiang, Miroslav Pajic, and Rahul Mangharam. 2012. Cyber--physical modeling of implantable cardiac medical devices. Proceedings of the IEEE 100, 1 (2012), 122--137.Google Scholar
Cross Ref
- Ivica Nikolić, Lei Wang, and Shuang Wu. 2013. Cryptanalysis of round-reduced LED. In International Workshop on Fast Software Encryption. Springer, 112--129.Google Scholar
- Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, and Kerem Varıcı. 2014. LS-designs: Bitslice encryption for efficient masked software implementations. In International Workshop on Fast Software Encryption. Springer, 18--37.Google Scholar
- Gregor Leander, Brice Minaud, and Sondre Rønjom. 2015. A generic approach to invariant subspace attacks: Cryptanalysis of Robin, iSCREAM and Zorro. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 254--283.Google Scholar
Cross Ref
- Chae Hoon Lim and Tymur Korkishko. 2006. mCrypton -- A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. Springer, Berlin, 243--258. DOI:http://dx.doi.org/10.1007/11604938_19Google Scholar
- Yonglin Hao, Dongxia Bai, and Leibo Li. 2014. A meet-in-the-middle attack on round-reduced mCrypton using the differential enumeration technique. In Network and System Security, Man Ho Au, Barbara Carminati, and C.-C. Jay Kuo (Eds.). Springer International Publishing, Cham, 166--183.Google Scholar
- Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, and Hossein Arabnezhad Khanooki. 2009. MIBS: A New Lightweight Block Cipher. Springer, Berlin, 334--348. DOI:http://dx.doi.org/10.1007/978-3-642-10433-6_22Google Scholar
- Asli Bay, Jorge Nakahara, and Serge Vaudenay. 2010. Cryptanalysis of reduced-round MIBS block cipher. In International Conference on Cryptology and Network Security. Springer, 1--19.Google Scholar
Cross Ref
- Aslı Bay, Jialin Huang, and Serge Vaudenay. 2014. Improved linear cryptanalysis of reduced-round MIBS. In International Workshop on Security. Springer, 204--220.Google Scholar
Cross Ref
- Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni. 2014. Midori: A block cipher for low energy. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 411--436.Google Scholar
- Zhan Chen and X. Y. Wang. 2017. Impossible differential cryptanalysis of midori. In Mechatronics and Automation Engineering: Proceedings of the International Conference on Mechatronics and Automation Engineering (ICMAE’16). World Scientific, 221--229.Google Scholar
- David Gérault and Pascal Lafourcade. 2016. Related-key cryptanalysis of Midori. In International Conference on Cryptology in India. Springer, 287--304.Google Scholar
Cross Ref
- Yu Sasaki and Yosuke Todo. 2017. New impossible differential search tool from design and cryptanalysis aspects. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 185--215.Google Scholar
Cross Ref
- Mitsuru Matsui. 1997. New Block Encryption Algorithm MISTY. Springer, Berlin, 54--68. DOI:http://dx.doi.org/10.1007/BFb0052334Google Scholar
- Achiya Bar-On and Nathan Keller. 2016. A 270 attack on the full MISTY1. In Annual International Cryptology Conference. Springer, 435--456.Google Scholar
- Yosuke Todo. 2017. Integral cryptanalysis on full MISTY1. Journal of Cryptology 30, 3 (2017), 920--959.Google Scholar
Digital Library
- Anthony Journault, François-Xavier Standaert, and Kerem Varici. 2017. Improving the security and efficiency of block ciphers based on LS-designs. Designs, Codes and Cryptography 82, 1–2 (2017), 495--509.Google Scholar
Digital Library
- M. Peeters, G. Van Assche, J. Daemen, and V. Rijmen. 2000. Nessie Proposal: NOEKEON. (2000). http://gro.noekeon.org/Noekeon-spec.pdf.Google Scholar
- Muhammad Reza Z’aba, Håvard Raddum, Matt Henricksen, and Ed Dawson. 2008. Bit-pattern based integral attack. In International Workshop on Fast Software Encryption. Springer, 363--381.Google Scholar
Digital Library
- Gilles Piret, Thomas Roche, and Claude Carlet. 2012. PICARO—A block cipher allowing efficient higher-order side-channel resistance. In International Conference on Applied Cryptography and Network Security. Springer, 311--328.Google Scholar
Digital Library
- Anne Canteaut, Virginie Lallemand, and María Naya-Plasencia. 2015. Related-key attack on full-round PICARO. In International Conference on Selected Areas in Cryptography. Springer, 86--101.Google Scholar
- Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai. 2011. Piccolo: An Ultra-Lightweight Blockcipher. Springer, Berlin, 342--357. DOI:http://dx.doi.org/10.1007/978-3-642-23951-9_23Google Scholar
- Marine Minier. 2013. On the security of Piccolo lightweight block cipher against related-key impossible differentials. In International Conference on Cryptology in India. Springer, 308--318.Google Scholar
Digital Library
- Yanfeng Wang, Wenling Wu, and Xiaoli Yu. 2012. Biclique cryptanalysis of reduced-round piccolo block cipher. In International Conference on Information Security Practice and Experience. Springer, 337--352.Google Scholar
Digital Library
- A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe. 2007. PRESENT: An Ultra-Lightweight Block Cipher. Springer, Berlin, 450--466. DOI:http://dx.doi.org/10.1007/978-3-540-74735-2_31Google Scholar
- Joo Yeon Cho. 2010. Linear cryptanalysis of reduced-round PRESENT. In Cryptographers’ Track at the RSA Conference. Springer, 302--317.Google Scholar
- Baudoin Collard and F.-X. Standaert. 2009. A statistical saturation attack against the block cipher PRESENT. In Cryptographers’ Track at the RSA Conference. Springer, 195--210.Google Scholar
- Céline Blondeau and Kaisa Nyberg. 2014. Links between truncated differential and multidimensional linear properties of block ciphers and underlying attack complexities. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 165--182.Google Scholar
Cross Ref
- Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, and Tolga Yalçın. 2012. PRINCE -- A Low-Latency Block Cipher for Pervasive Computing Applications. Springer, Berlin, 208--225. DOI:http://dx.doi.org/10.1007/978-3-642-34961-4_14Google Scholar
- Anne Canteaut, María Naya-Plasencia, and Bastien Vayssiere. 2013. Sieve-in-the-middle: Improved MITM attacks. In Annual Cryptology Conference. Springer, 222--240.Google Scholar
Cross Ref
- Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, and Yanfeng Wang. 2015. Reflection cryptanalysis of PRINCE-like ciphers. Journal of Cryptology 28, 3 (2015), 718--744.Google Scholar
Digital Library
- Lars Knudsen, Gregor Leander, Axel Poschmann, and Matthew J. B. Robshaw. 2010. PRINTcipher: A Block Cipher for IC-Printing. Springer, Berlin, 16--32. DOI:http://dx.doi.org/10.1007/978-3-642-15031-9_2Google Scholar
- Mohamed Ahmed Abdelraheem, Gregor Leander, and Erik Zenner. 2011. Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations. In International Workshop on Fast Software Encryption. Springer, 1--17.Google Scholar
Cross Ref
- Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, and Erik Zenner. 2011. A cryptanalysis of PRINTcipher: The invariant subspace attack. In Annual Cryptology Conference. Springer, 206--221.Google Scholar
Cross Ref
- C. Wang and H. M. Heys. 2009. An ultra compact block cipher for serialized architecture implementations. In 2009 Canadian Conference on Electrical and Computer Engineering. 1085--1090. DOI:http://dx.doi.org/10.1109/CCECE.2009.5090296Google Scholar
Cross Ref
- Céline Blondeau and Benoıt Gérard. 2011. Differential cryptanalysis of PUFFIN and PUFFIN2. In ECRYPT Workshop on Lightweight Cryptography. Citeseer, 1.Google Scholar
- Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, and Matthew J. B. Robshaw. 1998. On the Design and Security of RC2. Springer, Berlin, 206--221. DOI:http://dx.doi.org/10.1007/3-540-69710-1_14Google Scholar
- Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, and Matthew J. B. Robshaw. 1998. On the design and security of RC2. In International Workshop on Fast Software Encryption. Springer, 206--221.Google Scholar
- Ronald L. Rivest. 1995. The RC5 Encryption Algorithm. Springer, Berlin, 86--96. DOI:http://dx.doi.org/10.1007/3-540-60590-8_7Google Scholar
- Johan Borst, Bart Preneel, and Joos Vandewalle. 1999. Linear cryptanalysis of RC5 and RC6. In International Workshop on Fast Software Encryption. Springer, 16--30.Google Scholar
Cross Ref
- Alex Biryukov and Eyal Kushilevitz. 1998. Improved cryptanalysis of RC5. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 85--99.Google Scholar
Cross Ref
- Sidney R. Rivest, M. Robshaw, and Y. Yin. 1998. The RC6 block cipher. In Proceedings of the First Advanced Encryption Standard Conference (AES’98).Google Scholar
- Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, and Ingrid Verbauwhede. 2015. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences 58, (2015), 1--15.Google Scholar
Cross Ref
- Cihangir Tezcan, Galip Oral Okan, Asuman Şenol, Erol Doğan, Furkan Yücebaş, and Nazife Baykal. 2016. Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited. In International Workshop on Lightweight Cryptography for Security and Privacy. Springer, 18--32.Google Scholar
- Adnan Baysal and Sühap Şahin. 2015. Roadrunner: A small and fast bitslice block cipher for low cost 8-bit processors. In International Workshop on Lightweight Cryptography for Security and Privacy. Springer, 58--76.Google Scholar
- Qianqian Yang, Lei Hu, Siwei Sun, and Ling Song. 2016. Extension of meet-in-the-middle technique for truncated differential and its application to RoadRunneR. In International Conference on Network and System Security. Springer, 398--411.Google Scholar
Cross Ref
- François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, and Jean-Jacques Quisquater. 2006. SEA: A Scalable Encryption Algorithm for Small Embedded Applications. Springer, Berlin, 222--236. DOI:http://dx.doi.org/10.1007/11733447_16Google Scholar
- Jongwook Park, Sungjae Lee, Jeeyeon Kim, and Jaeil Lee. 2005. Retrieved on February 6, 2019 from https://tools.ietf.org/html/rfc4269.Google Scholar
- Hitoshi Yanami and Takeshi Shimoyama. 2002. Differential cryptanalysis of a reduced-round SEED. In International Conference on Security in Communication Networks. Springer, 186--198.Google Scholar
- Eli Biham, Ross Anderson, and Lars Knudsen. 1998. Serpent: A New Block Cipher Proposal. Springer, Berlin, 222--238. DOI:http://dx.doi.org/10.1007/3-540-69710-1_15Google Scholar
- Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. 2008. Multidimensional linear cryptanalysis of reduced round Serpent. In Australasian Conference on Information Security and Privacy. Springer, 203--215.Google Scholar
Digital Library
- Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, and Guang Gong. 2015. The Simeck family of lightweight block ciphers. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 307--329.Google Scholar
Cross Ref
- Kexin Qiao, Lei Hu, and Siwei Sun. 2015. Differential security evaluation of Simeck with dynamic key-guessing techniques. IACR Cryptology ePrint Archive 2015 (2015), 902.Google Scholar
- R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, and L. Wingers. 2015. The SIMON and SPECK lightweight block ciphers. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC’15). 1--6. DOI:http://dx.doi.org/10.1145/2744769.2747946Google Scholar
- Ning Wang, Xiaoyun Wang, Keting Jia, and Jingyuan Zhao. 2014. Improved differential attacks on reduced SIMON versions. IACR Cryptology ePrint Archive 2014 (2014), 448.Google Scholar
- Farzaneh Abed, Eik List, Stefan Lucks, and Jakob Wenzel. 2013. Differential and linear cryptanalysis of reduced-round SIMON. Cryptology ePrint Archive, Report 2013/526, 2013 (2013).Google Scholar
- Huaifeng Chen and Xiaoyun Wang. 2016. Improved linear hull attack on round-reduced Simon with dynamic key-guessing techniques. In International Conference on Fast Software Encryption. Springer, 428--449.Google Scholar
Digital Library
- Alex Biryukov, Arnab Roy, and Vesselin Velichkov. 2014. Differential analysis of block ciphers SIMON and SPECK. In International Workshop on Fast Software Encryption. Springer, 546--570.Google Scholar
- Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, and Siang Meng Sim. 2016. The SKINNY family of block ciphers and its low-latency variant MANTIS. In Annual Cryptology Conference. Springer, 123--153.Google Scholar
Digital Library
- Mohamed Tolba, Ahmed Abdelkhalek, and Amr M. Youssef. 2017. Impossible differential cryptanalysis of reduced-round SKINNY. In International Conference on Cryptology in Africa. Springer, 117--134.Google Scholar
- Eli Biham, Alex Biryukov, and Adi Shamir. 1999. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Springer, Berlin, Heidelberg, 12--23. DOI:http://dx.doi.org/10.1007/3-540-48910-X_2Google Scholar
- Eli Biham, Alex Biryukov, and Adi Shamir. 1999. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In Advances in Cryptology—EUROCRYPT’99, Jacques Stern (Ed.). Springer, Berlin, 12--23.Google Scholar
- Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, and Alex Biryukov. 2016. Design strategies for ARX with provable bounds: Sparx and LAX. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 484--513.Google Scholar
Cross Ref
- Ahmed Abdelkhalek, Mohamed Tolba, and Amr M. Youssef. 2017. Impossible differential attack on reduced round SPARX-64/128. In Progress in Cryptology—AFRICACRYPT’17, Marc Joye and Abderrahmane Nitaj (Eds.). Springer International Publishing, Cham, 135--146.Google Scholar
- Farzaneh Abed, Eik List, Stefan Lucks, and Jakob Wenzel. 2015. Differential cryptanalysis of round-reduced Simon and Speck. In Fast Software Encryption, Carlos Cid and Christian Rechberger (Eds.). Springer, Berlin, 525--545.Google Scholar
- Itai Dinur. 2014. Improved differential cryptanalysis of round-reduced speck. In Selected Areas in Cryptography—SAC’14, Antoine Joux and Amr Youssef (Eds.). Springer International Publishing, Cham, 147--164.Google Scholar
- David Wheeler and Roger Needham. 1995. TEA, a Tiny Encryption Algorithm. Springer-Verlag, 97--110.Google Scholar
- Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, and Jongin Lim. 2002. Impossible differential cryptanalysis of reduced round XTEA and TEA. In Fast Software Encryption, Joan Daemen and Vincent Rijmen (Eds.). Springer, Berlin, 49--60.Google Scholar
- Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson. 1998. Twofish: A 128-bit block cipher. In First Advanced Encryption Standard (AES) Conference.Google Scholar
- Stefan Lucks. 2002. The saturation attack—A bait for twofish. In Fast Software Encryption, Mitsuru Matsui (Ed.). Springer, Berlin, 1--15.Google Scholar
- Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, and Eita Kobayashi. 2011. Twine: A lightweight, versatile block cipher. In ECRYPT Workshop on Lightweight Cryptography (Vol. 2011).Google Scholar
- Mustafa Çoban, Ferhat Karakoç, and Özkan Boztaş. 2012. Biclique cryptanalysis of TWINE. In Cryptology and Network Security, Josef Pieprzyk, Ahmad-Reza Sadeghi, and Mark Manulis (Eds.). Springer, Berlin, 43--55.Google Scholar
- Roger M. Needham, David J. Wheeler, and David Wagner. Tea extensions. Retrieved from http://www.tcl.tk/doc/tea/TEAOverview.html.Google Scholar
- Benoît Gérard, Vincent Grosso, María Naya-Plasencia, and François-Xavier Standaert. 2013. Block ciphers that are easier to mask: How far can we go? In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 383--399.Google Scholar
Digital Library
- Gregor Leander, Brice Minaud, and Sondre Rønjom. 2015. A generic approach to invariant subspace attacks: Cryptanalysis of Robin, iSCREAM and Zorro. In Advances in Cryptology—EUROCRYPT’15, Elisabeth Oswald and Marc Fischlin (Eds.). Springer, Berlin, 254--283.Google Scholar
- Daniel J. Bernstein. ChaCha, a variant of Salsa20. ([n.d.]). http://ai2-s2-pdfs.s3.amazonaws.com/2ea9/7a1597dfa8d74c6e544fb4709532ef587c69.pdf.Google Scholar
- Subhamoy Maitra. 2016. Chosen IV cryptanalysis on reduced round ChaCha and Salsa. Discrete Applied Mathematics 208 (2016), 88--97.Google Scholar
Digital Library
- Kakumani K. C. Deepthi and Kunwar Singh. 2017. Cryptanalysis of Salsa and ChaCha: Revisited. In International Conference on Mobile Networks and Management. Springer, 324--338.Google Scholar
- Franço̧ois Arnault, Thierry Berger, Cédric Lauradoux, Marine Minier, and Benjamin Pousse. 2009. A New Approach for FCSRs. Springer, Berlin, 433--448. DOI:http://dx.doi.org/10.1007/978-3-642-05445-7_27Google Scholar
- Éliane Jaulmes and Frédéric Muller. 2005. Cryptanalysis of the F-FCSR stream cipher family. In International Workshop on Selected Areas in Cryptography. Springer, 20--35.Google Scholar
- Martin Hell and Thomas Johansson. 2008. Breaking the F-FCSR-H stream cipher in real time. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 557--569.Google Scholar
Digital Library
- Martin Hell, Thomas Johansson, Alexander Maximov, and Willi Meier. 2006. A stream cipher proposal: Grain-128. In 2006 IEEE International Symposium on Information Theory. IEEE, 1614--1618.Google Scholar
Cross Ref
- Martin Hell, Thomas Johansson, and Willi Meier. 2007. Grain: A stream cipher for constrained environments. International Journal of Wireless and Mobile Computing 2, 1 (2007), 86--93.Google Scholar
Digital Library
- P. R. Hridya and J. Jose. 2019. Cryptanalysis of the grain family of ciphers: A review. In 2019 International Conference on Communication and Signal Processing (ICCSP’19). 0892--0897. DOI:http://dx.doi.org/10.1109/ICCSP.2019.8697972Google Scholar
- Martin Boesgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen, and Ove Scavenius. 2003. Rabbit: A New High-Performance Stream Cipher. Springer, Berlin, 307--329. DOI:http://dx.doi.org/10.1007/978-3-540-39887-5_23Google Scholar
- Yi Lu, Huaxiong Wang, and San Ling. 2008. Cryptanalysis of rabbit. In International Conference on Information Security. Springer, 204--214.Google Scholar
Digital Library
- Christophe De Cannière. 2006. Trivium: A stream cipher construction inspired by block cipher design principles. In Proceedings of the 9th International Conference on Information Security. Springer-Verlag, 171--186.Google Scholar
- Michal Hojsík and Bohuslav Rudolf. 2008. Differential fault analysis of Trivium. In International Workshop on Fast Software Encryption. Springer, 158--172.Google Scholar
Digital Library
- Steve Babbage and Matthew Dodd. 2008. The MICKEY stream ciphers. In New Stream Cipher Designs. Springer, 191--209.Google Scholar
- Lin Ding and Jie Guan. 2013. Cryptanalysis of MICKEY family of stream ciphers. Security and Communication Networks 6, 8 (2013), 936--941.Google Scholar
Cross Ref
- Hongjun Wu. 2008. The stream cipher HC-128. New Stream Cipher Designs (2008), 39--47.Google Scholar
- Goutam Paul, Subhamoy Maitra, and Shashwat Raizada. A combinatorial analysis of HC-128. ([n.d.]).Google Scholar
- Hongjun Wu. 2004. A new stream cipher HC-256. In Fast Software Encryption. Springer, 226--244.Google Scholar
- Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, et al. 2008. Sosemanuk, a fast software-oriented stream cipher. New Stream Cipher Designs. Springer, 98--118.Google Scholar
- Joo Yeon Cho and Miia Hermelin. 2009. Improved linear cryptanalysis of SOSEMANUK. In International Conference on Information Security and Cryptology. Springer, 101--117.Google Scholar
- Daniel J. Bernstein. 2008. The Salsa20 family of stream ciphers. New Stream Cipher Designs Springer, 84--97.Google Scholar
- Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, and Christian Winnerlein. 2013. BLAKE2: Simpler, smaller, fast as MD5. In International Conference on Applied Cryptography and Network Security. Springer, 119--135.Google Scholar
Digital Library
- Yonglin Hao. 2014. The boomerang attacks on BLAKE and BLAKE2. In International Conference on Information Security and Cryptology. Springer, 286--310.Google Scholar
- Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen. 2009. Grøstl-a SHA-3 candidate. In Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum für Informatik.Google Scholar
- Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen. 2010. Rebound attacks on the reduced Grøstl hash function. In Cryptographers’ Track at the RSA Conference. Springer, 350--365.Google Scholar
- Florian Mendel, Vincent Rijmen, and Martin Schläffer. 2014. Collision attack on 5 rounds of Grøstl. In International Workshop on Fast Software Encryption. Springer, 509--521.Google Scholar
- Hongjun Wu. The Hash Function JH. ([n.d.]). Retrieved November 14, 2018 from https://www3.ntu.edu.sg/home/wuhj/research/jh/jh_round3.pdf.Google Scholar
- Vincent Rijmen, Deniz Toz, and Kerem Varıcı. 2010. Rebound attack on reduced-round versions of JH. In International Workshop on Fast Software Encryption. Springer, 286--303.Google Scholar
Cross Ref
- Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, and Gaithersburg NIST. 2013. Keccak and the SHA-3 standardization. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 313--314.Google Scholar
- Paweł Morawiecki and Marian Srebrny. 2013. A SAT-based preimage analysis of reduced KECCAK hash functions. Information Processing Letters 113, 10–11 (2013), 392--397.Google Scholar
Cross Ref
- Itai Dinur, Orr Dunkelman, and Adi Shamir. 2012. New attacks on Keccak-224 and Keccak-256. In International Workshop on Fast Software Encryption. Springer, 442--461.Google Scholar
Digital Library
- Alexandre Duc, Jian Guo, Thomas Peyrin, and Lei Wei. 2012. Unaligned rebound attack: Application to Keccak. In International Workshop on Fast Software Encryption. Springer, 402--421.Google Scholar
Digital Library
- Jian Guo, Thomas Peyrin, and Axel Poschmann. 2011. The PHOTON family of lightweight hash functions. Advances in Cryptology—CRYPTO’11 (2011), 222--239.Google Scholar
- Chia-Yu Lu, You-Wei Lin, Shang-Ming Jen, and Jar-Ferr Yang. 2012. Cryptanalysis on PHOTON hash function using cube attack. In 2012 International Conference on Information Security and Intelligent Control. IEEE, 278--281.Google Scholar
Cross Ref
- Jean-Philippe Aumasson, Luca Henzen, Willi Meier, and Maria Naya-Plasencia. 2013. QUARK: A lightweight hash. Journal of Cryptology 26, 2 (2013), 313--339.Google Scholar
Digital Library
- Jean-Philippe Aumasson and Daniel J. Bernstein. 2012. SipHash: A fast short-input PRF. Springer.Google Scholar
- Christoph Dobraunig, Florian Mendel, and Martin Schläffer. 2014. Differential cryptanalysis of siphash. In International Conference on Selected Areas in Cryptography. Springer, 165--182.Google Scholar
Cross Ref
- Niels Ferguson and Stefan Lucks. The Skein hash function family. ([n.d.]).Google Scholar
- Dmitry Khovratovich, Ivica Nikolić, and Christian Rechberger. 2010. Rotational rebound attacks on reduced Skein. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 1--19.Google Scholar
Cross Ref
- Dmitry Khovratovich, Christian Rechberger, and Alexandra Savelieva. 2012. Bicliques for preimages: Attacks on Skein-512 and the SHA-2 family. In International Workshop on Fast Software Encryption. Springer, 244--263.Google Scholar
Digital Library
- Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, and Ingrid Verbauwhede. 2013. Spongent: The design space of lightweight cryptographic hashing. IEEE Transactions on Computers 62, 10 (2013), 2041--2053.Google Scholar
Digital Library
- B. Preneel. 2005. CBC-MAC and variants. In Encyclopedia of Cryptography and Security. Springer, 63--66.Google Scholar
- Tetsu Iwata and Kaoru Kurosawa. 2003. OMAC: One-Key CBC MAC—Addendum.Google Scholar
- Phillip Rogaway. PMAC—A Parallelizable MAC—Background. ([n.d.]). Retrieved December 18, 2017 from http://web.cs.ucdavis.edu/ rogaway/ocb/pmac-bak.htm.Google Scholar
- Sheila Frankel and Howard Herbert. 2003. The AES-XCBC-MAC-96 Algorithm and Its Use with IPsec. Technical Report. RFC 3566, IETF, September.Google Scholar
- Hugo Krawczyk, Mihir Bellare, and Ran Canetti. 1997. HMAC: Keyed-hashing for Message Authentication. Technical Report. RFC 2104, IETF, February.Google Scholar
- Cameron F. Kerry. Digital signature standard (DSS). ([n.d.]).Google Scholar
- Thomas Pornin. 2013. Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). Internet Engineering Task Force RFC, 6979. 1--79.Google Scholar
- Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. 2012. High-speed high-security signatures. Journal of Cryptographic Engineering 2, 2 (2012), 77--89.Google Scholar
Cross Ref
- Jeffrey Hoffstein and Joseph H. Silverman. 2001. Polynomial rings and efficient public key authentication II. In Cryptography and Computational Number Theory. Springer, 269--286.Google Scholar
- Johannes Böck. 2011. RSA-PSS--Provable secure RSA Signatures and their Implementation.Google Scholar
- Shu-jen Chang, Ray Perlner, William E. Burr, Meltem Sönmez Turan, John M. Kelsey, Souradyuti Paul, and Lawrence E. Bassham. 2012. Third-round report of the SHA-3 cryptographic hash algorithm competition. NIST Interagency Report 7896 (2012), 121.Google Scholar
- Shay Gueron. AES-GCM for efficient authenticated encryption--ending the reign of HMAC-SHA-1.Google Scholar
- R. Housley. 2007. Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). RFC 5084, November.Google Scholar
- Tadayoshi Kohno, John Viega, and Doug Whiting. 2004. CWC: A high-performance conventional authenticated encryption mode. In Fast Software Encryption. Springer, 408--426.Google Scholar
- M. Bellare, P. Rogaway, and D. Wagner. 2003. EAX: A Conventional Authenticated-Encryption Mode. Cryptology ePrint Archive, Report 2003/069. http://eprint.iacr.org/2003/069.Google Scholar
- David McGrew and John Viega. 2005. The Galois/counter mode of operation (GCM). (2005). Retrieved from https://csrc.nist.gov/projects/block-cipher-techniques/bcm.Google Scholar
- Charanjit Jutla. 2000. Parallelizable encryption mode with almost free message integrity.Google Scholar
- Phillip Rogaway, Mihir Bellare, and John Black. 2003. OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC) 6, 3 (2003), 365--403.Google Scholar
Digital Library
- Hongjun Wu. ACORN v3. ([n.d.]). Retrieved November 16, 2018 from https://competitions.cr.yp.to/round3/acornv3.pdf.Google Scholar
- Bart Preneel Hongjun Wu. AEGIS v1.1. ([n.d.]). Retrieved November 16, 2018 from https://competitions.cr.yp.to/round3/aegisv11.pdf.Google Scholar
- Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer. 2016. Ascon v1. 2.Google Scholar
- Jérémy Jean, Ivica Nikolic, Thomas Peyrin, and Yannick Seurin. 2016. Deoxys v1. 41.Google Scholar
- Tao Huang and Hongjun Wu. 2016. Morus v2.Google Scholar
- Ted Krovetz and Phillip Rogaway. 2016. OCB (v1. 1).Google Scholar
- Farzaneh Abed, Christian Forler, and Stefan Lucks. 2016. General classification of the authenticated encryption schemes for the CAESAR competition. Computer Science Review 22 (2016), 13--26.Google Scholar
Cross Ref
- Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman speed records. In International Workshop on Public Key Cryptography. Springer, 207--228.Google Scholar
Digital Library
- WolfCrypt website. Retrieved February 6, 2019 from https://www.wolfssl.com/.Google Scholar
- LibTomCrypt website. Retrieved February 6, 2019 from https://www.libtom.net/LibTomCrypt/.Google Scholar
- Daniel J. Bernstein and Tanja Lange. 2013. eBACS: ECRYPT benchmarking of cryptographic systems.Google Scholar
- Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, and Alex Biryukov. 2015. Triathlon of lightweight block ciphers for the Internet of Things. IACR Cryptology ePrint Archive 2015 (2015), 209.Google Scholar
- Bluetooth 4.0 NRF51822 Eval Kit. Retrieved September 17, 2019 from https://www.waveshare.com/nrf51822-eval-kit.htm.Google Scholar
- GCC. Retrieved September 17, 2019 from https://gcc.gnu.org/onlinedocs/gcc/Optimize-Options.html.Google Scholar
- Arduino Uno Rev3. Retrieved September 17, 2019 from https://store.arduino.cc/arduino-uno-rev3.Google Scholar
- Thomas Eisenbarth and Sandeep Kumar. 2007. A survey of lightweight-cryptography implementations. IEEE Design 8 Test of Computers 24, 6 (2007).Google Scholar
Digital Library
- Carsten Rolfes, Axel Poschmann, Gregor Leander, and Christof Paar. Ultra-lightweight implementations for smart devices—Security for 1000 gate equivalents. Springer.Google Scholar
- Panasayya Yalla and Jens-Peter Kaps. 2009. Lightweight cryptography for FPGAs. In International Conference on Reconfigurable Computing and FPGAs (ReConFig’09). IEEE, 225--230.Google Scholar
Digital Library
- Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, and Loic van Oldeneel tot Oldenzeel. 2012. Compact implementation and performance evaluation of block ciphers in ATtiny devices. In Proceedings of the 5th International Conference on Cryptology in Africa (AFRICACRYPT’12). Springer-Verlag, Berlin, 172--187. DOI:http://dx.doi.org/10.1007/978-3-642-31410-0_11Google Scholar
Digital Library
- Stéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol, and François-Xavier Standaert. 2012. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint. Springer, Berlin, 390--407. DOI:http://dx.doi.org/10.1007/978-3-642-33027-8_23Google Scholar
- Neil Hanley and Maire ONeill. 2012. Hardware comparison of the iso/iec 29192-2 block ciphers. In IEEE Computer Society Annual Symposium on (ISVLSI’12). IEEE, 57--62.Google Scholar
Digital Library
- Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, and Tolga Yalçin. 2013. Dietary recommendations for lightweight block ciphers: Power, energy and area analysis of recently developed architectures. In RFIDSec, Lecture Notes in Computer Science, Vol. 8262, Michael Hutter and Jörn-Marc Schmidt (Eds.). Springer, 103--112. http://dblp.uni-trier.de/db/conf/rfidsec/rfidsec2013.html#BatinaDEKMPVY13.Google Scholar
- Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, and Konstantinos Rantos. 2014. Lightweight cryptography for embedded systems and a comparative analysis. In Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247. Springer-Verlag, New York, 333--349. DOI:http://dx.doi.org/10.1007/978-3-642-54568-9_21Google Scholar
Digital Library
- M. Cazorla, K. Marquet, and M. Minier. 2013. Survey and benchmark of lightweight block ciphers for wireless sensor networks. In 2013 International Conference on Security and Cryptography (SECRYPT’13). 1--6.Google Scholar
- Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. 2014. The SIMON and SPECK block ciphers on AVR 8-bit microcontrollers. In International Workshop on Lightweight Cryptography for Security and Privacy. Springer, 3--20.Google Scholar
- Lukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, and Vaclav Zeman. 2014. Evaluation of Software-Oriented Block Ciphers on Smartphones. Springer International Publishing, Cham, 353--368. DOI:http://dx.doi.org/10.1007/978-3-319-05302-8_22Google Scholar
- Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, and Guang Gong. 2015. The Simeck family of lightweight block ciphers. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 307--329.Google Scholar
Cross Ref
- Subhadeep Banik, Andrey Bogdanov, and Francesco Regazzoni. 2015. Exploring energy efficiency of lightweight block ciphers. In International Conference on Selected Areas in Cryptography. Springer, 178--194.Google Scholar
- Andrey Bogdanov and Takanori Isobe. 2015. White-box cryptography revisited: Space-hard ciphers. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 1058--1069.Google Scholar
Digital Library
- W. Diehl, F. Farahmand, P. Yalla, J. P. Kaps, and K. Gaj. 2017. Comparison of hardware and software implementations of selected lightweight block ciphers. In 2017 27th International Conference on Field Programmable Logic and Applications (FPL’17). 1--4. DOI:http://dx.doi.org/10.23919/FPL.2017.8056808Google Scholar
Cross Ref
- George Hatzivasilis, Apostolos Theodoridis, Elias Gasparis, Charalampos Manifavas, and I. Papaefstathiou. 2014. ULCL-An ultra-lightweight cryptographic library for embedded systems. In PECCS. 247--254.Google Scholar
- Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, et al. 2012. Compact implementation and performance evaluation of hash functions in ATtiny devices. In International Conference on Smart Card Research and Advanced Applications. Springer, 158--172.Google Scholar
- Ekawat Homsirikamol and Kris Gaj. 2015. Hardware benchmarking of cryptographic algorithms using high-level synthesis tools: The SHA-3 contest case study. In International Symposium on Applied Reconfigurable Computing. Springer, 217--228.Google Scholar
Cross Ref
- Nicolas Fournel, Marine Minier, and Stéphane Ubéda. 2007. Survey and benchmark of stream ciphers for wireless sensor networks. In IFIP International Workshop on Information Security Theory and Practices. Springer, 202--214.Google Scholar
Digital Library
- Tim Good and Mohammed Benaissa. Hardware results for selected stream cipher candidates. ([n.d.]).Google Scholar
- Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, and Yannis Papaefstathiou. 2016. A survey of lightweight stream ciphers for embedded systems. Security and Communication Networks 9, 10 (2016), 1226--1246.Google Scholar
Digital Library
- Marcos A. Simplicio, Bruno T. de Oliveira, Paulo S. L. M. Barreto, Cintia B. Margi, Tereza C. M. B. Carvalho, and Mats Naslund. 2011. Comparison of authenticated-encryption schemes in wireless sensor networks. In IEEE 36th Conference on Local Computer Networks (LCN’11). IEEE, 450--457.Google Scholar
Digital Library
- Marcos A. Simplicio, Bruno T. de Oliveira, Cintia B. Margi, Paulo S. L. M. Barreto, Tereza C. M. B. Carvalho, and Mats Näslund. 2013. Survey and comparison of message authentication solutions on wireless sensor networks. Ad Hoc Networks 11, 3 (2013), 1221--1236.Google Scholar
Digital Library
- Ted Krovetz and Phillip Rogaway. 2011. The software performance of authenticated-encryption modes. In International Workshop on Fast Software Encryption. Springer, 306--327.Google Scholar
Cross Ref
- Ralph Ankele and Robin Ankele. Software benchmarking of the 2nd round CAESAR candidates. ([n.d.]).Google Scholar
- eSTREAM: The ECRYPT Stream Cipher Project. ([n.d.]). Retrieved May 9, 2018 from http://www.ecrypt.eu.org/stream/.Google Scholar
- Abdulmonem M. Rashwan, A. E. M. Taha, and Hossam S. Hassanein. 2012. Benchmarking message authentication code functions for mobile computing. In 2012 IEEE Global Communications Conference (GLOBECOM’12). IEEE, 2585--2590.Google Scholar
- William Diehl and Kris Gaj. 2017. RTL implementations and FPGA benchmarking of selected CAESAR Round Two authenticated ciphers. Microprocessors and Microsystems 52 (2017), 202--218.Google Scholar
Digital Library
- Ralph Ankele and Robin Ankele. 2016. Software benchmarking of the 2nd round CAESAR candidates.Google Scholar
- R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, and L. Wingers. 2015. The SIMON and SPECK lightweight block ciphers. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC’15). 1--6. DOI:http://dx.doi.org/10.1145/2744769.2747946Google Scholar
- Brad Conte’s AES Implementation. ([n.d.]).Google Scholar
- Semiconductor, N.O.R.D.I.C. 2013. nRF51822 Product Specification v3. 1. Trondheim, Norway, Retrieved on January 7, 2019 from http://infocenter.nordicsemi.com/pdf/nRF51822_PS_v3.1.pdf.Google Scholar
- Ali Nikoukar, Mansour Abboud, Borna Samadi, Mesut Güneş, and Behnam Dezfouli. 2018. Empirical analysis and modeling of Bluetooth low-energy (BLE) advertisement channels. In 2018 17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net’18). IEEE, 1--6.Google Scholar
Cross Ref
- Jacopo Tosi, Fabrizio Taffoni, Marco Santacatterina, Roberto Sannino, and Domenico Formica. 2017. Performance evaluation of Bluetooth low energy: A systematic review. Sensors 17, 12 (2017), 2898.Google Scholar
Cross Ref
- Kim HS, inventor; Samsung Electronics Co Ltd, assignee. 2008. Method of controlling signal power level and a Bluetooth device for performing the same. United States patent US 7,389,088. Field of the Invention: Bluetooth network, Issued date: 2008 Jun 17.Google Scholar
- Elaine Barker, William Barker, William Burr, William Polk, and Miles Smid. NIST special publication 800-57. NIST Special Publication 800, 57 ([n.d.]), 1--142.Google Scholar
- Dan Boneh and Hovav Shacham. Fast variants of RSA. ([n.d.]).Google Scholar
- Chae Hoon Lim and Hyo Sun Hwang. 2000. Fast implementation of elliptic curve arithmetic in GF (). In International Workshop on Public Key Cryptography. Springer, 405--421.Google Scholar
Cross Ref
- Giacomo De Meulenaer, François Gosset, François-Xavier Standaert, and Olivier Pereira. 2008. On the energy cost of communication and cryptography in wireless sensor networks. In IEEE International Conference on Wireless and Mobile Computing Networking and Communications (WIMOB 08). IEEE, 580--585.Google Scholar
Digital Library
- Tae-Ho Hwang, Dong-Sun Kim, and Jung-Guk Kim. 2013. An on-time power-aware scheduling scheme for medical sensor SoC-based WBAN systems. Sensors 13, 1 (2013), 375--392.Google Scholar
Cross Ref
- Andreas Haeberlin, Adrian Zurbuchen, Sébastien Walpen, Jakob Schaerer, Thomas Niederhauser, Christoph Huber, Hildegard Tanner, Helge Servatius, Jens Seiler, Heinrich Haeberlin, et al. 2015. The first batteryless, solar-powered cardiac pacemaker. Heart Rhythm 12, 6 (2015), 1317--1323.Google Scholar
Cross Ref
- Bitsliced AES source code. Retrieved February 6, 2019 from https://github.com/conorpp/bitsliced-aes.Google Scholar
- Bitsliced PRESENT source code. Retrieved February 6, 2019 from https://github.com/conorpp/bitsliced-aes.Google Scholar
- David Canright and Dag Arne Osvik. 2009. A more compact AES. In International Workshop on Selected Areas in Cryptography. Springer, 157--169.Google Scholar
Digital Library
- D. Klose. 2016. Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated. Retrieved June 18, 2018 from http://www.lightweightcrypto.org/implementations.php.Google Scholar
Index Terms
Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs
Recommendations
A review of data security and cryptographic techniques in IoT based devices
ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed SystemsThe idea of the Internet of Things (IoT) is to connect or give access to everything to the Internet. IoT environment not only provides the facility of Human to Machine connectivity, however, it also creates Machine to Machine connectivity. As everything ...
Energy consumption for securing lightweight IoT protocols
IoT '20: Proceedings of the 10th International Conference on the Internet of ThingsIn this paper we address the energy consumption of the Constraint Application Protocol (CoAP) and the Message Queue Telemetry Transport (MQTT) protocol and compare their overhead. We also pay attention to the use case of security in IoT and analyze the ...
Analysis of the Impact of Interaction Patterns and IoT Protocols on Energy Consumption of IoT Consumer Applications
Distributed Applications and Interoperable SystemsAbstractNowadays, it is estimated that half the connected devices are related to the Internet of Things (IoT). The IoT paradigm contributes to the increase of the Information Technology energy demand. The energy demand is due on one side to the huge ...






Comments