Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography

نویسندگان

چکیده

Lightweight cryptography algorithms are increasing in value because they can enhance security under limited resources. National Institute of Standards and Technology is working on standardising lightweight authenticated encryption with associated data. Thirty-two candidates included the second round NIST selection process, their specifications differ respect to various points. Therefore, for each algorithm, differences expected affect algorithm's performance. This study aims facilitate design those according usage scenarios. For this purpose, we investigate compare 32 algorithm using software implementations. The results indicate that latency memory depend parameters nonlinear operations. In terms usage, a difference exists ROM but not RAM from our experiments ARM platform. We also discovered data size be processed efficiently differs padding scheme, mode operation, block size.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Second Lightweight Cryptography Status Report

The design of lightweight block ciphers has been a very active research topic over the last years. However, the lack of comparative source codes generally makes it hard to evaluate the extent to which different ciphers actually reach their low-cost goals, on different platforms. This paper reports on an initiative aimed to partially relax this issue. First, we implemented 11 block ciphers on an...

متن کامل

NIST Performance Analysis of the Final Round JavaTM AES Candidates

NIST solicited candidate algorithms for the Advanced Encryption Standard (AES) in a Federal Register Announcement dated September 12, 1997[1]. Fifteen of the submissions were deemed “complete and proper” as defined in the Announcement, and entered the first round of the AES selection process in August 1998. Since that time, NIST has been working with a worldwide community of cryptographers to e...

متن کامل

Security Reductions of the Second Round SHA-3 Candidates

In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. At present, 14 candidates are left in the second round. An important criterion in the selecti...

متن کامل

Studies in Lightweight Cryptography

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Hadi Soleimany Name of the doctoral dissertation Studies in Lightweight Cryptography Publisher School of Science Unit Department of Information and Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 211/2014 Field of research Theoretical Computer Science Manuscript submitted 26 September 2014 Da...

متن کامل

Software Benchmarking of the 2nd round CAESAR Candidates

Abstract. The software performance of cryptographic schemes is an important factor in the decision to include such a scheme in real-world protocols like TLS, SSH or IPsec. In this paper, we develop a benchmarking framework to perform software performance measurements on authenticated encryption schemes. In particular, we apply our framework to independently benchmark the 29 remaining 2nd round ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of information processing

سال: 2023

ISSN: ['0387-6101']

DOI: https://doi.org/10.2197/ipsjjip.31.205