Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
English
Alsahli, Malik[University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)]
Borgognoni, Alex[University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Cheng, Hao[University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > APSIA >]
Cardoso Dos Santos, Luan[University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Franck, Christian[University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Groszschädl, Johann[University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Dec-2022
Innovative Security Solutions for Information Technology and Communications 15th International Conference, SECITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers
Bella, Giampaolo
Doinea, Mihai
Janicke, Helge
Springer Verlag
vol. ?? of Lecture Notes in Computer Science
??-??
Yes
15th International Conference on Security for Information Technology and Communications (SecITC 2022)
[en] The U.S. National Institute of Standards and Technology is currently undertaking a process to evaluate and eventually standardize one or more "lightweight" algorithms for authenticated encryption and hashing that are suitable for resource-restricted devices. In addition to security, this process takes into account the efficiency of the candidate algorithms in various hardware environments (e.g. FPGAs, ASICs) and software platforms (e.g. 8, 16, 32-bit microcontrollers). However, while there exist numerous detailed benchmarking results for 8-bit AVR and 32-bit ARM/RISC-V/ESP32 microcontrollers, relatively little is known about the candidates' efficiency on 16-bit platforms. In order to fill this gap, we present a performance evaluation of the final-round candidates Ascon, Schwaemm, TinyJambu, and Xoodyak on the MSP430 series of ultra-low-power 16-bit microcontrollers from Texas Instruments. All four algorithms were explicitly designed to achieve high performance in software and have further in common that the underlying primitive is a permutation. We discuss how these permutations can be implemented efficiently in Assembly language and analyze how basic design decisions impact their execution time on the MSP430 architecture. Our results show that, overall, Schwaemm is the fastest algorithm across various lengths of data and associated data, respectively. Xoodyak has benefits when a large amount of associated data is to be authenticated, whereas TinyJambu is very efficient for the authentication of short messages.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography