Skip to main content
Top

2018 | OriginalPaper | Chapter

Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis

Authors : Tasnime Omrani, Rhouma Rhouma, Layth Sliman

Published in: Digital Economy. Emerging Technologies and Business Innovation

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Several Lightweight cryptosystems were specially designed for constrained-devices. For this reason many papers have been comparing and assessing existing Lightweight cryptosystems. Our contribution; compared to those papers; is to analyse the recently and popular Lightweight cryptosystems using actual devices used in IoT context namely the Raspberry Pi 2 B and Arduino UNO. The evaluation is based on RAM and ROM consumption, speed performance by evaluating Encryption/Decryption time speed and clock cycle and security level. The results of this evaluation indicates the superiority of Speck in term of memory consumption, Rectangle in term of speed performance and Present in term of security level.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. Technical report (2014) Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. Technical report (2014)
3.
go back to reference Data Encryption Standard. Data encryption standard. Federal Information Processing Standards Publication (1999) Data Encryption Standard. Data encryption standard. Federal Information Processing Standards Publication (1999)
4.
go back to reference Eisenbarth, T., Kumar, S.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24(6), 522–533 (2007)CrossRef Eisenbarth, T., Kumar, S.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24(6), 522–533 (2007)CrossRef
5.
go back to reference Kaur, S., Kaur, S.: Comparative analysis of lightweight cryptography algorithms for smart grids. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 564–567 (2017) Kaur, S., Kaur, S.: Comparative analysis of lightweight cryptography algorithms for smart grids. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 564–567 (2017)
6.
go back to reference Biryukov, A., Perrin, L.P.: State of the art in lightweight symmetric cryptography. IACR Cryptology ePrint Archive (2017) Biryukov, A., Perrin, L.P.: State of the art in lightweight symmetric cryptography. IACR Cryptology ePrint Archive (2017)
7.
go back to reference Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for embedded systems – a comparative analysis. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W.M. (eds.) DPM/SETOP -2013. LNCS, vol. 8247, pp. 333–349. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54568-9_21CrossRef Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for embedded systems – a comparative analysis. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W.M. (eds.) DPM/SETOP -2013. LNCS, vol. 8247, pp. 333–349. Springer, Heidelberg (2014). https://​doi.​org/​10.​1007/​978-3-642-54568-9_​21CrossRef
8.
go back to reference Hu, H., Zhang, L., Wu, J.: Hamming distance based approximate similarity text search algorithm. In: 2015 Seventh International Conference on Advanced Computational Intelligence (ICACI), pp. 1–6. IEEE (2015) Hu, H., Zhang, L., Wu, J.: Hamming distance based approximate similarity text search algorithm. In: 2015 Seventh International Conference on Advanced Computational Intelligence (ICACI), pp. 1–6. IEEE (2015)
9.
go back to reference Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26(3), 189–221 (2002)CrossRef Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26(3), 189–221 (2002)CrossRef
10.
go back to reference Jha, V.K.: Cryptanalysis of lightweight block ciphers. Ph.D. thesis, Aalto University, Helsinki (2011) Jha, V.K.: Cryptanalysis of lightweight block ciphers. Ph.D. thesis, Aalto University, Helsinki (2011)
12.
go back to reference Abdelraheem, M.A. et al.: Improved linear cryptanalysis of reduced-round simon. Cryptology ePrint Archive, Report 2014/681 (2014) Abdelraheem, M.A. et al.: Improved linear cryptanalysis of reduced-round simon. Cryptology ePrint Archive, Report 2014/681 (2014)
13.
go back to reference Ashur, T., Bodden, D.: Linear cryptanalysis of reduced-round speck. In: Proceedings of the 37th Symposium on Information Theory in the Benelux. Werkgemeenschap voor Informatie-en Communicatietheorie (2016) Ashur, T., Bodden, D.: Linear cryptanalysis of reduced-round speck. In: Proceedings of the 37th Symposium on Information Theory in the Benelux. Werkgemeenschap voor Informatie-en Communicatietheorie (2016)
Metadata
Title
Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis
Authors
Tasnime Omrani
Rhouma Rhouma
Layth Sliman
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-97749-2_8

Premium Partner