Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform

نویسندگان

چکیده

Highly constrained devices that are interconnected and interact to complete a task being used in diverse range of new fields. The Internet Things (IoT), cyber-physical systems, distributed control vehicular wireless sensor networks, tele-medicine, the smart grid few examples these In any contexts, security privacy might be essential aspects. Research on secure communication (IoT) networks is highly contested topic. One method for ensuring data transmission cryptography. Because IoT have limited resources, such as power, memory, batteries, boosted term “lightweight cryptography”. Algorithms lightweight cryptography designed efficiently protect while using minimal resources. this research, we evaluated benchmarked symmetric ciphers resource-constrained devices. evaluation performed two widely platform: Arduino Raspberry Pi. first part, implemented 39 block an ATMEGA328p microcontroller analyzed them terms speed, cost, energy efficiency during encryption decryption different key sizes. second 2nd-round NIST candidates (80 stream cipher algorithms) were added first-part comprehensive analysis equivalent sizes latency efficiency.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

WG 2 - Lightweight Cryptographic Algorithms

Project co-funded by the European Commission within the 7th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...

متن کامل

Recommendations for Hardware Evaluation of Cryptographic Algorithms

At the SASC 2006 three papers on hardware implementation of the eSTREAM candidates were presented. The workshop provided an interesting platform where hardware designers were confronted with the developers of the algorithms. The presentations were followed by a lively discussion. As hardware designers, we must admit that we have learned a lot from these discussions. In this brief document we wa...

متن کامل

A Hardware Design Model for Cryptographic Algorithms

A hardware implementation model is proposed that can be used in the design of stream ciphers, block ciphers and cryptographic hash functions. The cryptographic nite state machine (CFSM) model is no mathematical tool, but a set of criteria that have to be met by a real hardware nite state machine that will be used in the implementation of a cryptographic algorithm. Diiusion is studied by means o...

متن کامل

Comparative Analysis of Cryptographic Algorithms

Cryptography is the study of Secret (crypto-) writing (-graphy) that is concealing the content of message from all except the sender and the receiver and to authenticate the correctness of message to the recipient. Data security is the challenging issue of today that touches many areas including computers and communication. Recent cyber security attacks have certainly played with the sentiments...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Internet

سال: 2023

ISSN: ['1999-5903']

DOI: https://doi.org/10.3390/fi15020054