URI | http://purl.tuc.gr/dl/dias/6E41DDB5-47B9-4248-99A7-D0293D6DCBD5 | - |
Αναγνωριστικό | https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.1399 | - |
Αναγνωριστικό | https://doi.org/10.1002/sec.1399 | - |
Γλώσσα | en | - |
Μέγεθος | 21 pages | en |
Τίτλος | A survey of lightweight stream ciphers for embedded systems | en |
Δημιουργός | Manifavas Charalabos | en |
Δημιουργός | Μανιφαβας Χαραλαμπος | el |
Δημιουργός | Chatzivasilis Georgios | en |
Δημιουργός | Χατζηβασιλης Γεωργιος | el |
Δημιουργός | Fysarakis Konstantinos | en |
Δημιουργός | Φυσαρακης Κωνσταντινος | el |
Δημιουργός | Papaefstathiou Ioannis | en |
Δημιουργός | Παπαευσταθιου Ιωαννης | el |
Εκδότης | John Wiley and Sons | en |
Περίληψη | Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight cryptographic mechanisms. Block ciphers, the main symmetric key cryptosystems, perform well in this field. Nevertheless, stream ciphers are also relevant in ubiquitous computing applications, as they can be used to secure the communication in applications where the plaintext length is either unknown or continuous, like network streams. This paper provides the latest survey of stream ciphers for embedded systems. Lightweight implementations of stream ciphers in embedded hardware and software are examined as well as relevant authenticated encryption schemes. Their speed and simplicity enable compact and low-power implementations, allow them to excel in applications pertaining to resource-constrained devices. The outcomes of the International Organization for Standardization/International Electrotechnical Commission 29192-3 standard and the cryptographic competitions eSTREAM and Competition for Authenticated Encryption: Security, Applicability, and Robustness are summarized along with the latest results in the field. However, cryptanalysis has proven many of these schemes are actually insecure. From the 31 designs that are examined, only six of them have been found to be secure by independent cryptanalysis. A constrained benchmark analysis is performed on low-cost embedded hardware and software platforms. The most appropriate and secure solutions are then mapped in different types of applications. | en |
Τύπος | Peer-Reviewed Journal Publication | en |
Τύπος | Δημοσίευση σε Περιοδικό με Κριτές | el |
Άδεια Χρήσης | http://creativecommons.org/licenses/by/4.0/ | en |
Ημερομηνία | 2018-10-02 | - |
Ημερομηνία Δημοσίευσης | 2016 | - |
Θεματική Κατηγορία | Authenticated encryption | en |
Θεματική Κατηγορία | Embedded systems | en |
Θεματική Κατηγορία | Lightweight cryptography | en |
Θεματική Κατηγορία | Stream ciphers | en |
Βιβλιογραφική Αναφορά | C. Manifavas, G. Hatzivasilis, K. Fysarakis and Y. Papaefstathiou, "A survey of lightweight stream ciphers for embedded systems," Secur. Commun. Netw., vol. 9, no. 10, pp. 1226-1246, Jul. 2016. doi: 10.1002/sec.1399 | en |