Performance analysis of current lightweight stream ciphers for constrained environments
- PDF / 884,610 Bytes
- 12 Pages / 595.276 x 790.866 pts Page_size
- 35 Downloads / 215 Views
Indian Academy of Sciences Sadhana(0123456789().,-volV)F T3](0123456789().,-volV)
Performance analysis of current lightweight stream ciphers for constrained environments SUBHRAJYOTI DEB* and BUBU BHUYAN Department of Information Technology, North-Eastern Hill University, Shillong, India e-mail: [email protected]; [email protected] MS received 29 August 2019; revised 14 June 2020; accepted 27 July 2020 Abstract. Maintaining an adequate balance between security and other performance metrics like memory requirement, throughput and energy requirement in a resource-constrained environment is a major challenge. The National Institute of Standards and Technology (NIST), in its latest lightweight cryptography report, suggested the suitability of symmetric ciphers in constrained devices. In this paper we have performed statistical security analyses of six state-of-the-art stream ciphers, namely Lizard, Fruit, Plantlet, Sprout, Grain v1 and Espresso, with the help of randomness test, structural test, autocorrelation test and avalanche test. We have also carried out the performance analysis of these ciphers in detail after porting the optimized code of the ciphers to a low-cost microcontroller, namely ATmega 328P. The selection of the device is based on its acceptability in the Internet of Things (IoT)-based network. The statistical security, performance metrics and comparative analysis suggest the suitability of the selected ciphers for providing security in constrained environments. Keywords.
Stream cipher; block cipher; lightweight cryptography; IoT; randomness test; constrained device.
1. Introduction Providing security services in a resource-constrained environment is a significant research challenge, and presently a spurt of research activities has taken place in this direction [1–6]. This rise in research interests is a result of several promising applications like smart city applications, remote health monitoring systems, disaster management systems, etc., which require secured communication among heterogeneous resource-constrained distributed devices. Addressing security issues in such a resource-constrained environment is the significant hurdle for successful implementation of these applications in a wider scale. The cryptographic primitives that are used to provide security in these networks should be lightweight in terms of requirements of memory, energy, etc. Further, these primitives should also be easily implementable in hardware. Out of the various security issues, maintaining the balance between the level of security and computational cost in a resourceconstraint environment is a prominent one that has caught the attention of many researchers [7–9]. Asymmetric key cryptographic techniques are not suitable for the constrained environment as they require large computational processing, memory space and energy. Recently the lightweight symmetric cryptography has received considerable attention, because it provides high-level security in constrained environments like Internet of Things (IoT) [10]. *Fo
Data Loading...