In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate execution time, RAM footprint, as well as (binary) code size, and allows a user to define a custom "figure of merit" according to which all evaluated candidates can be ranked. We used the framework to benchmark various implementations of 13 lightweight ciphers, namely AES, Fantomas, HIGHT, LBlock, LED, Piccolo, PRESENT, PRINCE, RC5, Robin, Simon, Speck, and TWINE, on three different platforms: 8-bit ATmega, 16-bit MSP430, and 32-bit ARM. Our results give new insights to the question of how well these ciphers are suited to secure the Internet of Things (IoT). The benchmarking f...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
In this paper we present 7 block cipher algorithms Simon, Speck, KATAN, LED, TEA, Present and Sea. ...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
Abstract. The design of lightweight block ciphers has been a very ac-tive research topic over the la...
The design of lightweight block ciphers has been a very active research topic over the last years. H...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
The security of resource-constrained devices is critical in the IoT field, given that everything is ...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
In this paper we present 7 block cipher algorithms Simon, Speck, KATAN, LED, TEA, Present and Sea. ...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
Abstract. The design of lightweight block ciphers has been a very ac-tive research topic over the la...
The design of lightweight block ciphers has been a very active research topic over the last years. H...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
The security of resource-constrained devices is critical in the IoT field, given that everything is ...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
In this paper we present 7 block cipher algorithms Simon, Speck, KATAN, LED, TEA, Present and Sea. ...