Evaluation of cryptographic primitives on modern microcontroller platforms

被引:0
|
作者
Stancu, Florin Alexandru [1 ]
Tranca, Cristian Dumitru [1 ]
Chiroiu, Mihai Daniel [1 ]
Rughinis, Razvan [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Comp Sci, Bucharest, Romania
来源
2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET) | 2018年
关键词
security; cryptography; embedded; microcontrollers; ARM; SECURITY; INTERNET;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an important issue, sometimes critical, when it comes to embedded applications such as industrial, Internet of Things or wearable devices. Due to the limited resources available, adding modern cryptography features may be difficult, even unfeasible in some cases. In this paper, we evaluate the different implementations (mbedTLS, TomCrypt, wolfSSL) of popular cryptographic algorithms (AES, SHA, ChaCha, Poly1305, RSA) on modern, 32-bit microcontrollers. We present the results: space requirements, memory usage, speed and power consumption on three popular, representative ARM Cortex-M platforms. We analyze and compare them to help embedded application developers in choosing the tools without too much compromises in security.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] The Black-Box Model for Cryptographic Primitives
    Claus Peter Schnorr
    Serge Vaudenay
    Journal of Cryptology, 1998, 11 : 125 - 140
  • [32] Random Organic Nanolaser Arrays for Cryptographic Primitives
    Feng, Jiangang
    Wen, Wen
    Wei, Xiao
    Jiang, Xiangyu
    Cao, Moyuan
    Wang, Xuedong
    Zhang, Xiqi
    Jiang, Lei
    Wu, Yuchen
    ADVANCED MATERIALS, 2019, 31 (36)
  • [33] Obfuscated Arbitrary Computation using Cryptographic Primitives
    Tsoutsos, Nektarios Georgios
    Maniatakos, Michail
    2015 10TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2015, : 5 - 8
  • [34] ANALYSIS OF SOME CRYPTOGRAPHIC PRIMITIVES ON COMPUTER CLUSTERS
    Semenov, A. A.
    Zaikin, O. S.
    Bespalov, D., V
    Burov, P. S.
    Hmelnov, A. E.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 120 - 130
  • [35] Cryptographic primitives enforcing communication and storage complexity
    Golle, P
    Jarecki, S
    Mironov, I
    FINANCIAL CRYPTOGRAPHY, 2003, 2357 : 120 - 135
  • [36] Pseudo-free families and cryptographic primitives
    Anokhin, Mikhail
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2022, 16 (01) : 114 - 140
  • [37] Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
    Martinho, Joana
    Ravara, Antonio
    JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 293 - 323
  • [38] The performance measurement of cryptographic primitives on Palm devices
    Wong, DS
    Fuentes, HH
    Chan, AH
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 92 - 101
  • [39] The black-box model for cryptographic primitives
    Schnorr, CP
    Vaudenay, S
    JOURNAL OF CRYPTOLOGY, 1998, 11 (02) : 125 - 140
  • [40] CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives
    Hill, Gregory
    Bellekens, Xavier
    INFORMATION, 2018, 9 (09)