A survey of cryptography algorithms for systems with limited resources

Jacek Lach

Abstract


This article surveys cryptography algorithms that can be effectively used in systems built with limited resources such as microcontrollers. The most important aspect taken into consideration was its practical usefulness for software implementation. The survey of algorithms designed for hardware implementation which can be effectively implemented in software was also conducted.

Keywords


cryptography; one-chip microcontroller; cryptography algorithm

Full Text:

PDF (Polski)

References


Konighofer R.: A fast and cache-timing resistant implementation of the AES. Lecture Notes in Computer Science, Vol. 4964, Springer, 2008, s. 187-202.

Aoki K., Ichikawa T., Kanda M., Matsui M., Moriai S., Nakajima J., Tokita T.: Specification of Camellia - a 128-Bit Błock Cipher. Specification Version 2.0, Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation. 2001.

Gong Z., Nikova S., Law Y. W.: KLEIN: A New Family of Lightweight Błock Ciphers, Technical Report, Centre for Telematics and Information Technology, University of Twente, 2010.

Law Y.W., Doumen J.,Hartel P. H.: Survey and benchmark of błock ciphers for wireless sensor networks. ACM Transactions Sensor Networks, 2(1), 2006, s. 65-93.

Skipjack and kea algorithm specifications (version 2.0). National Institute of Standards and Technology online document. http://csrc.nist.gov/groups/ST/toolkit/documents/skipjack/skipjack.pdf, 1998.

Rivest R, Robshaw, M., Sidney, R., And Yin, Y.: The RC6™ Błock Cipher. Specification version 1.1.

Rivest R. L.: The RC5 encryption algorithm. Lecture Notes in Computer Science, Vol.l008, 1995, s. 86-96

Biryukov A. Kushilevitz E.: Improved Cryptanalysis of RC5. EUROCRYPT 1998.

Schneier B., Kelsey J., Whiting D., Wagner D., Hall Ch., Ferguson N.: The Twofish encryption algorithm: a 128-bit błock cipher. John Wiley & Sons, Inc., New York, 1999.

Rinne S., Eisenbarth T., Paar C: Performance Analysis of Contemporary Light-Weight Błock Ciphers on 8-bit Microcontrollers. Ecrypt workshop SPEED - Software Performance Enhancement for Encryption and Decryption, 2007.

Eisenbarth T., Kumar S., Paar Ch., Poschmann A. Uhsadel L.: A Survey of Lightweight-Cryptography Implementations. IEEE Computer Society Press, Los Alamitos 2007.

Lim C.H., Korkishko T.: mCrypton - a lightweight błock cipher for security of low-cost RFID tags and sensors. Lecture Notes in Computer Science, Vol. 3786, Springer, Berlin 2005, s. 243-258.

Park J. H.: Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications. International Journal of Communication Systems, John Wiley and Sons Ltd, .Chichester, UK, 2009, s. 959-969.

Murat Ç.: Software implementation and performance comparison of popular błock ciphers on 8-bit low-cost microcontroller. International Journal of the Physical Sciences Vol. 5(9), 2010, s. 1338-1343.

Shirai T., Shibutani K., Akishita T., Moriai S., Iwata T.: The 128-bit blockcipher CLEFIA (extended abstract). Lecture Notes in Computer Science, Vol. 4593, Springer-Verlag, 2007, s. 181-195.

Bogdanov A., Rijmen V.: Zero-Correlation Linear Cryptanalysis of Błock Ciphers. IACR ePrint archive: Report 2011/123.

Rebeiro Ch., Mukhopadhyay .: Cryptanalysis of CLEFIA using Differential Methods with Cache Trace Patterns. Lecture Notes in Computer Science Vol. 6558, Springer-Verlag, 2011, s. 89-103.

Standaert F., Piret F., Gershenfeld N.:, Quisquater J: SEA: A Scalable Encryption Algorithm for Smali Embedded Applications," Lecture Notes in Computer Science Vol. 3928, Spain, 2006, s. 222-236.

Hong D., Sung J., Hong S., Lim J., Lee S., Koo B., Lee C, Chang D., Lee J., Jeong T., Kim H., Kim J., Chee J.: HIGHT: A new błock cipher suitable for low-resource device. Lecture Notes in Computer Science Vol. 4249, Springer-Verlag, 2006, s. 46-59.

Lu J.: Cryptanalysis of reduced versions of the HIGHT błock cipher from CHES 2006. Lecture Notes in Computer Science, Vol. 4817, Springer-Verlag, 2007, s. 11-26.

Bogdanov A., Knudsen L.R., Le G., Paar C, Poschmann A., Robshaw M.J.B., Seurin Y., Vikkelsoe M.: PRESENT: An Ultra-Lightweight Błock Cipher, Springer, 2007

Ohkuma K.: Weak keys of reduced-round present for linear cryptanalysis. Springer-Verlag, 2009.

Cho J.Y.: Linear cryptanalysis of reduced-round present. Lecture Notes in Computer Science Vol. 5985, 2010, s. 302-317.

Kelsey J., Schneier B., Wagner D.: Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Springer-Verlag, 1997.

Lai X., Massey J., Murphy S.: Markov Ciphers and Differential Cryptanalysis. Lecture Notes in Computer Science Vol. 547, Springer-Verlag, 1992, s. 17-38.

Biham E., Dunkelman O., and Keller N.: A New Attack on 6-Round IDEA. Lecture Notes in Computer Science Vol. 4593, Springer-Verlag, 2007, s. 211-224.

Biryukov A., Nakahara J., Preneel B., Vandewalle J.: New Weak-Key Classes of IDEA. Lecture Notes in Computer Science Vol. 2513, Springer, 2002, s. 315-326.

Wheeler D.J., Needham R.M.: TEA, a tiny encryption algorithm. Lecture Notes in Computer Science Vol. 1008, Springer, 1994, s. 363-366.

Needham R.M., Wheeler D.J.: TEA extensions. Technical report, Computer Laboratory, University of Cambridge, 1997.

Yarrkov E.: Cryptanalysis of XXTEA. Cryptology ePrint Archive: Report 2010/254.

Anderson R., Biham E., Knudsen L.: The Case for Serpent. AES Candidate Conference, http://www.cl.cam.ac.uk/~rjal4/Papers/serpentcase.pdf, 2000.

Biham E.: A Fast New DES Implementation in Software. Fast Software Encryption, Springer-Verlag, 1997.

Law Y.W., Doumen J., Hartel P: Survey and benchmark of błock ciphers for wireless sensor networks. ACM Transactions on Sensor Networks Vol. 2, ACM, 2006, s. 65-93.

Eisenbarth T., Kumar S., Paar Ch., Poschmann A., Uhsadel L.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers Vol. 24(6), 2007, s. 522-533.

Leander G., Paar Ch., Poschmann A., Schramm K.: New Lightweight DES Variants. Lecture Notes in Computer Science Vol. 4593, Springer, 2007, s. 196-210.

Lenstra A.K., Verheul E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 2001, s. 255-293.




DOI: http://dx.doi.org/10.21936/si2011_v32.n4A.210