Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
ALSAHLI, Malik Ruzayq M; BORGOGNONI, Alex; CARDOSO DOS SANTOS, Luan et al.
2022In Bella, Giampaolo; Doinea, Mihai; Janicke, Helge (Eds.) Innovative Security Solutions for Information Technology and Communications, 15th International Conference, SECITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers
Peer reviewed
 

Documents


Texte intégral
SecITC2022.pdf
Postprint Auteur (320.56 kB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Lightweight Cryptography; Permutation-Based Cryptography; Authenticated Encryption; MSP430 Microcontroller; Assembly Optimization; Performance Evaluation
Résumé :
[en] The U.S. National Institute of Standards and Technology is currently undertaking a process to evaluate and eventually standardize one or more "lightweight" algorithms for authenticated encryption and hashing that are suitable for resource-restricted devices. In addition to security, this process takes into account the efficiency of the candidate algorithms in various hardware environments (e.g. FPGAs, ASICs) and software platforms (e.g. 8, 16, 32-bit microcontrollers). However, while there exist numerous detailed benchmarking results for 8-bit AVR and 32-bit ARM/RISC-V/ESP32 microcontrollers, relatively little is known about the candidates' efficiency on 16-bit platforms. In order to fill this gap, we present a performance evaluation of the final-round candidates Ascon, Schwaemm, TinyJambu, and Xoodyak on the MSP430 series of ultra-low-power 16-bit microcontrollers from Texas Instruments. All four algorithms were explicitly designed to achieve high performance in software and have further in common that the underlying primitive is a permutation. We discuss how these permutations can be implemented efficiently in Assembly language and analyze how basic design decisions impact their execution time on the MSP430 architecture. Our results show that, overall, Schwaemm is the fastest algorithm across various lengths of data and associated data, respectively. Xoodyak has benefits when a large amount of associated data is to be authenticated, whereas TinyJambu is very efficient for the authentication of short messages.
Centre de recherche :
- Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography
Disciplines :
Sciences informatiques
Auteur, co-auteur :
ALSAHLI, Malik Ruzayq M ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
BORGOGNONI, Alex ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
CARDOSO DOS SANTOS, Luan ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
CHENG, Hao ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > APSIA
FRANCK, Christian ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
GROSZSCHÄDL, Johann ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things
Date de publication/diffusion :
décembre 2022
Nom de la manifestation :
15th International Conference on Security for Information Technology and Communications (SecITC 2022)
Lieu de la manifestation :
Bucharest, Roumanie
Date de la manifestation :
from 08-12-2022 to 09-12-2022
Titre de l'ouvrage principal :
Innovative Security Solutions for Information Technology and Communications, 15th International Conference, SECITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers
Editeur scientifique :
Bella, Giampaolo
Doinea, Mihai
Janicke, Helge
Maison d'édition :
Springer Verlag
ISBN/EAN :
978-3-031-32636-3
Collection et n° de collection :
vol. 13809 of Lecture Notes in Computer Science
Pagination :
17-36
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR13641232 - Analysis And Protection Of Lightweight Cryptographic Algorithms, 2019 (01/01/2021-31/12/2023) - Alex Biryukov
Organisme subsidiant :
FNR - Fonds National de la Recherche
Disponible sur ORBilu :
depuis le 31 janvier 2023

Statistiques


Nombre de vues
393 (dont 35 Unilu)
Nombre de téléchargements
439 (dont 24 Unilu)

citations Scopus®
 
2
citations Scopus®
sans auto-citations
1
citations OpenAlex
 
2

Bibliographie


Publications similaires



Contacter ORBilu