Evaluation of cryptographic primitives on modern microcontroller platforms

被引:0
|
作者
Stancu, Florin Alexandru [1 ]
Tranca, Cristian Dumitru [1 ]
Chiroiu, Mihai Daniel [1 ]
Rughinis, Razvan [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Comp Sci, Bucharest, Romania
关键词
security; cryptography; embedded; microcontrollers; ARM; SECURITY; INTERNET;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an important issue, sometimes critical, when it comes to embedded applications such as industrial, Internet of Things or wearable devices. Due to the limited resources available, adding modern cryptography features may be difficult, even unfeasible in some cases. In this paper, we evaluate the different implementations (mbedTLS, TomCrypt, wolfSSL) of popular cryptographic algorithms (AES, SHA, ChaCha, Poly1305, RSA) on modern, 32-bit microcontrollers. We present the results: space requirements, memory usage, speed and power consumption on three popular, representative ARM Cortex-M platforms. We analyze and compare them to help embedded application developers in choosing the tools without too much compromises in security.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Diffusive primitives in the design of modern cryptographic algorithms
    Jamel, Sapiee Haji
    Deris, Mustafa Mat
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 707 - 710
  • [2] Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
    Plaga, Sven
    Wiedermann, Norbert
    Niedermaier, Matthias
    Giehl, Alexander
    Newe, Thomas
    2018 12TH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2018, : 52 - 57
  • [3] Cryptographic primitives
    Garrett, P
    PUBLIC-KEY CRYPTOGRAPHY, 2005, 62 : 1 - 62
  • [4] A Study of Cryptographic Backdoors in Cryptographic Primitives
    Easttom, Chuck
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1664 - 1669
  • [5] A limitation on security evaluation of cryptographic primitives with fixed keys
    Kawai, Yutaka
    Hanaoka, Goichiro
    Ohta, Kazuo
    Kunihiro, Noboru
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1663 - 1675
  • [6] On the Design of Cryptographic Primitives
    Pino Caballero-Gil
    Amparo Fúster-Sabater
    Acta Applicandae Mathematica, 2006, 93 : 279 - 297
  • [7] On the design of cryptographic primitives
    Caballero-Gil, Pino
    Fuster-Sabater, Amparo
    ACTA APPLICANDAE MATHEMATICAE, 2006, 93 (1-3) : 279 - 297
  • [8] Cryptographic primitives in blockchains
    Wang, Licheng
    Shen, Xiaoying
    Li, Jing
    Shao, Jun
    Yang, Yixian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 43 - 58
  • [9] Software Optimizations for Cryptographic Primitives on General Purpose x86_64 Platforms
    Gueron, Shay
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 399 - 400
  • [10] Evaluation of Cryptographic Primitives Security Based on Proximity to the Latin Square
    Palagushin, Vladimir V.
    Khomonenko, Anatoly D.
    Adadurov, Sergey E.
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 266 - 271