Reference : Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/54270
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
English
Alsahli, Malik [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)]
Borgognoni, Alex [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Cheng, Hao [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > APSIA >]
Cardoso Dos Santos, Luan [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Franck, Christian [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Groszschädl, Johann mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Dec-2022
Innovative Security Solutions for Information Technology and Communications 15th International Conference, SECITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers
Bella, Giampaolo
Doinea, Mihai
Janicke, Helge
Springer Verlag
vol. ?? of Lecture Notes in Computer Science
??-??
Yes
15th International Conference on Security for Information Technology and Communications (SecITC 2022)
from 08-12-2022 to 09-12-2022
Bucharest
Romania
[en] Lightweight Cryptography ; Permutation-Based Cryptography ; Authenticated Encryption ; MSP430 Microcontroller ; Assembly Optimization ; Performance Evaluation
[en] The U.S. National Institute of Standards and Technology is currently undertaking a process to evaluate and eventually standardize one or more "lightweight" algorithms for authenticated encryption and hashing that are suitable for resource-restricted devices. In addition to security, this process takes into account the efficiency of the candidate algorithms in various hardware environments (e.g. FPGAs, ASICs) and software platforms (e.g. 8, 16, 32-bit microcontrollers). However, while there exist numerous detailed benchmarking results for 8-bit AVR and 32-bit ARM/RISC-V/ESP32 microcontrollers, relatively little is known about the candidates' efficiency on 16-bit platforms. In order to fill this gap, we present a performance evaluation of the final-round candidates Ascon, Schwaemm, TinyJambu, and Xoodyak on the MSP430 series of ultra-low-power 16-bit microcontrollers from Texas Instruments. All four algorithms were explicitly designed to achieve high performance in software and have further in common that the underlying primitive is a permutation. We discuss how these permutations can be implemented efficiently in Assembly language and analyze how basic design decisions impact their execution time on the MSP430 architecture. Our results show that, overall, Schwaemm is the fastest algorithm across various lengths of data and associated data, respectively. Xoodyak has benefits when a large amount of associated data is to be authenticated, whereas TinyJambu is very efficient for the authentication of short messages.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography
Fonds National de la Recherche - FnR
http://hdl.handle.net/10993/54270

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
SecITC2022.pdfAuthor postprint313.04 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.