Lightweight Cryptography for Embedded Systems - A Comparative Analysis

被引:58
作者
Manifavas, Charalampos [1 ]
Hatzivasilis, George [2 ]
Fysarakis, Konstantinos [2 ]
Rantos, Konstantinos [3 ]
机构
[1] Technol Educ Inst Crete, Dept Informat Engn, Iraklion, Crete, Greece
[2] Eastern Macedonia & Thrace Inst Technol, Dept Comp & Informat Engn, Kavala, Greece
[3] Technol Educ Inst Kavala, Dept Ind Informat, Kavala, Greece
来源
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013 | 2014年 / 8247卷
关键词
HASH FUNCTIONS; BLOCK CIPHER; FAMILY; IMPLEMENTATION;
D O I
10.1007/978-3-642-54568-9_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As computing becomes pervasive, embedded systems are deployed in a wide range of domains, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications. An integral part of the functionality of these systems is the storage, access and transmission of private, sensitive or even critical information. Therefore, the confidentiality and integrity of the resources and services of said devices constitutes a prominent issue that must be considered during their design. There is a variety of cryptographic mechanisms which can be used to safeguard the confidentiality and integrity of stored and transmitted information. In the context of embedded systems, however, the problem at hand is exacerbated by the resource-constrained nature of the devices, in conjunction with the persistent need for smaller size and lower production costs. This paper provides a comparative analysis of lightweight cryptographic algorithms applicable to such devices, presenting recent advances in the field for symmetric and asymmetric algorithms as well as hash functions. A classification and evaluation of the schemes is also provided, utilizing relevant metrics in order to assess their suitability for various types of embedded systems.
引用
收藏
页码:333 / 349
页数:17
相关论文
共 67 条
[1]  
[Anonymous], 25 CHAOS COMM C
[2]  
[Anonymous], IRACST INT J COMPUT
[3]  
[Anonymous], VERY COMPACT HARDWAR
[4]  
[Anonymous], 2009, AVR CRYPTO LIB
[5]  
[Anonymous], ECRYPT WORKSH SASC S
[6]  
[Anonymous], RFIDSEC 2008
[7]  
[Anonymous], P 21 ED GREAT LAK S
[8]  
[Anonymous], THESIS
[9]  
[Anonymous], WORKSH STAT ART STRE
[10]  
[Anonymous], 3 SHA 3 CAND C WASH