Evaluation of cryptographic primitives on modern microcontroller platforms

被引:0
|
作者
Stancu, Florin Alexandru [1 ]
Tranca, Cristian Dumitru [1 ]
Chiroiu, Mihai Daniel [1 ]
Rughinis, Razvan [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Comp Sci, Bucharest, Romania
来源
2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET) | 2018年
关键词
security; cryptography; embedded; microcontrollers; ARM; SECURITY; INTERNET;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an important issue, sometimes critical, when it comes to embedded applications such as industrial, Internet of Things or wearable devices. Due to the limited resources available, adding modern cryptography features may be difficult, even unfeasible in some cases. In this paper, we evaluate the different implementations (mbedTLS, TomCrypt, wolfSSL) of popular cryptographic algorithms (AES, SHA, ChaCha, Poly1305, RSA) on modern, 32-bit microcontrollers. We present the results: space requirements, memory usage, speed and power consumption on three popular, representative ARM Cortex-M platforms. We analyze and compare them to help embedded application developers in choosing the tools without too much compromises in security.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Automated Identification of Cryptographic Primitives in Binary Programs
    Groebert, Felix
    Willems, Carsten
    Holz, Thorsten
    RECENT ADVANCES IN INTRUSION DETECTION, 2011, 6961 : 41 - +
  • [42] Cryptographic primitives based on compact knapsack problem
    Rizos, George S.
    Draziotis, Konstantinos A.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [43] Watermarking Public-Key Cryptographic Primitives
    Goyal, Rishab
    Kim, Sam
    Manohar, Nathan
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 367 - 398
  • [44] On Bitcoin Security in the Presence of Broken Cryptographic Primitives
    Giechaskiel, Ilias
    Cremers, Cas
    Rasmussen, Kasper B.
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 201 - 222
  • [45] Cryptographic primitives for information authentication - State of the art
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 49 - 104
  • [46] Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
    Pereira, Geovandro C. C. F.
    Alves, Renan C. A.
    da Silva, Felipe L.
    Azevedo, Roberto M.
    Albertini, Bruno C.
    Margi, Cintia B.
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [47] A MEASURE OF DEPENDENCE FOR CRYPTOGRAPHIC PRIMITIVES RELATIVE TO IDEAL FUNCTIONS
    Smith-Tone, Daniel
    Tone, Cristina
    ROCKY MOUNTAIN JOURNAL OF MATHEMATICS, 2015, 45 (04) : 1283 - 1309
  • [48] Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF
    Vikash Kumar Rai
    Somanath Tripathy
    Jimson Mathew
    Journal of Hardware and Systems Security, 2021, 5 (3-4) : 247 - 259
  • [49] How to construct cryptographic primitives from stream ciphers
    Golic, JD
    COMPUTERS & SECURITY, 2001, 20 (01) : 79 - 89
  • [50] Adaptable Cryptographic Primitives in Blockchains via Smart Contracts
    Longo, Riccardo
    Mascia, Carla
    Meneghetti, Alessio
    Santilli, Giordano
    Tognolini, Giovanni
    CRYPTOGRAPHY, 2022, 6 (03)