Lightweight Cryptography for Embedded Systems - A Comparative Analysis

被引:56
|
作者
Manifavas, Charalampos [1 ]
Hatzivasilis, George [2 ]
Fysarakis, Konstantinos [2 ]
Rantos, Konstantinos [3 ]
机构
[1] Technol Educ Inst Crete, Dept Informat Engn, Iraklion, Crete, Greece
[2] Eastern Macedonia & Thrace Inst Technol, Dept Comp & Informat Engn, Kavala, Greece
[3] Technol Educ Inst Kavala, Dept Ind Informat, Kavala, Greece
来源
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013 | 2014年 / 8247卷
关键词
HASH FUNCTIONS; BLOCK CIPHER; FAMILY; IMPLEMENTATION;
D O I
10.1007/978-3-642-54568-9_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As computing becomes pervasive, embedded systems are deployed in a wide range of domains, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications. An integral part of the functionality of these systems is the storage, access and transmission of private, sensitive or even critical information. Therefore, the confidentiality and integrity of the resources and services of said devices constitutes a prominent issue that must be considered during their design. There is a variety of cryptographic mechanisms which can be used to safeguard the confidentiality and integrity of stored and transmitted information. In the context of embedded systems, however, the problem at hand is exacerbated by the resource-constrained nature of the devices, in conjunction with the persistent need for smaller size and lower production costs. This paper provides a comparative analysis of lightweight cryptographic algorithms applicable to such devices, presenting recent advances in the field for symmetric and asymmetric algorithms as well as hash functions. A classification and evaluation of the schemes is also provided, utilizing relevant metrics in order to assess their suitability for various types of embedded systems.
引用
收藏
页码:333 / 349
页数:17
相关论文
共 50 条
  • [41] Lightweight Cryptography for Resource Constrained Devices
    Shraddha, B. H.
    Kinnal, Bhagyashree
    Wali, Heera
    Iyer, Nalini C.
    Vishal, P.
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 553 - 564
  • [42] Lightweight Cryptography: A Solution to Secure IoT
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) : 1947 - 1980
  • [43] Effective data rate on ethernet interfaces for embedded systems: A comparative analysis
    De Campos F.P.V.
    De Campos M.L.R.
    Martins C.H.N.
    Ribeiro M.V.
    De Campos, F.P.V. (fabricio.campos@ufjf.edu.br), 1600, Springer Science and Business Media, LLC (24): : 806 - 815
  • [44] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [45] A survey of lightweight-cryptography implementations
    Eisenbarth, Thomas
    Kumar, Sandeep
    Paar, Christof
    Poschmann, Axel
    Uhsadel, Leif
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 522 - 533
  • [46] ReCPE: A PE for Reconfigurable Lightweight Cryptography
    Anderson, Jeff
    Alkabani, Yousra
    El-Ghazawi, Tarek
    34TH IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (SOCC), 2021, : 176 - 181
  • [47] Lightweight Cryptography: A Solution to Secure IoT
    Sumit Singh Dhanda
    Brahmjit Singh
    Poonam Jindal
    Wireless Personal Communications, 2020, 112 : 1947 - 1980
  • [48] Matrix Encryption Walks for Lightweight Cryptography
    Dunmore, Aeryn
    Samandari, Juliet
    Jang-Jaccard, Julian
    CRYPTOGRAPHY, 2023, 7 (03)
  • [49] Lightweight Cryptography and DPA Countermeasures: A Survey
    Moradi, Amir
    Poschmann, Axel
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 68 - +
  • [50] Lightweight Cryptography Techniques for MHealth Cybersecurity
    Shahbodin, Faaizah
    Azni, A. H.
    Ali, Tasnuva
    Mohd, Che Ku Nuraini Che Ku
    2019 ASIA PACIFIC INFORMATION TECHNOLOGY CONFERENCE (APIT 2019), 2019, : 44 - 50