A survey of lightweight stream ciphers for embedded systems

被引:51
|
作者
Manifavas, Charalampos [1 ]
Hatzivasilis, George [2 ]
Fysarakis, Konstantinos [2 ]
Papaefstathiou, Yannis [2 ]
机构
[1] Rochester Inst Technol Dubai, Dept Elect Engn & Comp Sci, Techno Point Bldg, Dubai Silicon Oasis 341055, Dubai, U Arab Emirates
[2] Tech Univ Crete, Dept Elect & Comp Engn, Akrotiri Campus, Khania 73100, Crete, Greece
关键词
authenticated encryption; embedded systems; lightweight cryptography; stream ciphers; CONSTRAINED DEVICES; SECRET KEY; CRYPTANALYSIS; CRYPTOGRAPHY; ATTACK; RC4; COMMUNICATION; FEEDBACK; HC-128; A5/1;
D O I
10.1002/sec.1399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight cryptographic mechanisms. Block ciphers, the main symmetric key cryptosystems, perform well in this field. Nevertheless, stream ciphers are also relevant in ubiquitous computing applications, as they can be used to secure the communication in applications where the plaintext length is either unknown or continuous, like network streams. This paper provides the latest survey of stream ciphers for embedded systems. Lightweight implementations of stream ciphers in embedded hardware and software are examined as well as relevant authenticated encryption schemes. Their speed and simplicity enable compact and low-power implementations, allow them to excel in applications pertaining to resource-constrained devices. The outcomes of the International Organization for Standardization/International Electrotechnical Commission 29192-3 standard and the cryptographic competitions eSTREAM and Competition for Authenticated Encryption: Security, Applicability, and Robustness are summarized along with the latest results in the field. However, cryptanalysis has proven many of these schemes are actually insecure. From the 31 designs that are examined, only six of them have been found to be secure by independent cryptanalysis. A constrained benchmark analysis is performed on low-cost embedded hardware and software platforms. The most appropriate and secure solutions are then mapped in different types of applications. Copyright (c) 2015 John Wiley & Sons, Ltd
引用
收藏
页码:1226 / 1246
页数:21
相关论文
共 50 条
  • [21] SOME RESULTS ON LIGHTWEIGHT STREAM CIPHERS FOUNTAIN V1 & LIZARD
    Anand, Ravi
    Roy, Dibyendu
    Sarkar, Santanu
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020, : 298 - 319
  • [22] Generating chaotic stream ciphers using chaotic systems
    Lee, PH
    Pei, SC
    Chen, YY
    CHINESE JOURNAL OF PHYSICS, 2003, 41 (06) : 559 - 581
  • [23] Lightweight services for embedded systems
    Milanovic, N
    Richling, J
    Malek, M
    SECOND IEEE WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2004, : 40 - 44
  • [24] Lightweight block ciphers for resource-constrained environments: A comprehensive survey
    Zhong, Yue
    Gu, Jieming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 157 : 288 - 302
  • [25] STREAM CIPHERS.
    Piper, Fred
    Elektrotechnik und Maschinenbau, 1987, 104 (12): : 564 - 568
  • [26] Stream ciphers and correlation
    Brincat, K
    Piper, FC
    Wild, PR
    DIFFERENCE SETS, SEQUENCES AND THEIR CORRELATION PROPERTIES, 1999, 542 : 17 - 44
  • [27] Kolmogorov Stream Ciphers
    Scharinger, Josef
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 1 - 8
  • [28] A survey of divide and conquer attacks on certain irregularly clocked stream ciphers
    Dawson, E
    Simpson, L
    Golic, J
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 165 - 185
  • [29] Generating nonlinear feedback stream ciphers via chaotic systems
    Zhou, Hong
    Luo, Jie
    Ling, Xieting
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1997, 25 (10): : 57 - 60
  • [30] A review of lightweight block ciphers
    George Hatzivasilis
    Konstantinos Fysarakis
    Ioannis Papaefstathiou
    Charalampos Manifavas
    Journal of Cryptographic Engineering, 2018, 8 : 141 - 184