A survey of lightweight stream ciphers for embedded systems

被引:52
作者
Manifavas, Charalampos [1 ]
Hatzivasilis, George [2 ]
Fysarakis, Konstantinos [2 ]
Papaefstathiou, Yannis [2 ]
机构
[1] Rochester Inst Technol Dubai, Dept Elect Engn & Comp Sci, Techno Point Bldg, Dubai Silicon Oasis 341055, Dubai, U Arab Emirates
[2] Tech Univ Crete, Dept Elect & Comp Engn, Akrotiri Campus, Khania 73100, Crete, Greece
关键词
authenticated encryption; embedded systems; lightweight cryptography; stream ciphers; CONSTRAINED DEVICES; SECRET KEY; CRYPTANALYSIS; CRYPTOGRAPHY; ATTACK; RC4; COMMUNICATION; FEEDBACK; HC-128; A5/1;
D O I
10.1002/sec.1399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight cryptographic mechanisms. Block ciphers, the main symmetric key cryptosystems, perform well in this field. Nevertheless, stream ciphers are also relevant in ubiquitous computing applications, as they can be used to secure the communication in applications where the plaintext length is either unknown or continuous, like network streams. This paper provides the latest survey of stream ciphers for embedded systems. Lightweight implementations of stream ciphers in embedded hardware and software are examined as well as relevant authenticated encryption schemes. Their speed and simplicity enable compact and low-power implementations, allow them to excel in applications pertaining to resource-constrained devices. The outcomes of the International Organization for Standardization/International Electrotechnical Commission 29192-3 standard and the cryptographic competitions eSTREAM and Competition for Authenticated Encryption: Security, Applicability, and Robustness are summarized along with the latest results in the field. However, cryptanalysis has proven many of these schemes are actually insecure. From the 31 designs that are examined, only six of them have been found to be secure by independent cryptanalysis. A constrained benchmark analysis is performed on low-cost embedded hardware and software platforms. The most appropriate and secure solutions are then mapped in different types of applications. Copyright (c) 2015 John Wiley & Sons, Ltd
引用
收藏
页码:1226 / 1246
页数:21
相关论文
共 119 条
  • [1] Grain-128a: A new version of Grain-128 with optional authentication
    Ågren M.
    Hell M.
    Johansson T.
    Meier W.
    [J]. International Journal of Wireless and Mobile Computing, 2011, 5 (01) : 48 - 59
  • [2] Akgün M, 2008, LECT NOTES COMPUT SC, V5365, P40, DOI 10.1007/978-3-540-89754-5_4
  • [3] AlFardan N., 2013, P 22 USENIX SEC S, P305
  • [4] Anderson Ross J., 1998, Serpent: A Proposal for the Advanced Encryption Standard
  • [5] [Anonymous], ECRYPT WORKSH SASC S
  • [6] [Anonymous], 2014, P MESECCS LISB PORT
  • [7] [Anonymous], MEASURABLE SECURITY
  • [8] [Anonymous], THESIS
  • [9] [Anonymous], 2012, 291923 ISOIEC
  • [10] [Anonymous], 2013, 180006 ISOIEC