Cryptology ePrint Archive: Report 2015/209

Triathlon of Lightweight Block Ciphers for the Internet of Things

Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Lo Perrin and Johann Groschdl and Alex Biryukov

Abstract: In this paper we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate the execution time, RAM footprint, as well as binary code size, and allows one to define a custom "figure of merit" according to which all evaluated candidates can be ranked. We used the framework to benchmark implementations of 19 lightweight ciphers, namely AES, Chaskey, Fantomas, HIGHT, LBlock, LEA, LED, Piccolo, PRESENT, PRIDE, PRINCE, RC5, RECTANGLE, RoadRunneR, Robin, Simon, SPARX, Speck, and TWINE, on three microcontroller platforms: 8-bit AVR, 16-bit MSP430, and 32-bit ARM. Our results bring some new insights to the question of how well these lightweight ciphers are suited to secure the Internet of Things (IoT). The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state-of-the-art and allows standardization organizations to conduct a fair and consistent evaluation of a large number of candidates.

Category / Keywords: Implementation / Lightweight cryptography, Block ciphers, Benchmarking, Usage scenarios, Microcontrollers

Original Publication (with minor differences): Journal of Cryptographic Engineering (to appear). A preliminary version of this paper was presented at the NIST Workshop on Lightweight Cryptography, which took place in Gaithersburg, MD, in June 2015.

Date: received 5 Mar 2015, last revised 30 Jun 2018

Contact author: johann groszschaedl at uni lu

Available format(s): PDF | BibTeX Citation

Note: Updated results based on Assembler implementations for 9 of the 19 evaluated ciphers.

Version: 20180630:092806 (All versions of this report)

Short URL: ia.cr/2015/209


[ Cryptology ePrint archive ]