A Performance Comparison of Hashed and Authenticated Advanced Encryption Standard

Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday
{"title":"A Performance Comparison of Hashed and Authenticated Advanced Encryption Standard","authors":"Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009112","DOIUrl":null,"url":null,"abstract":"The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Smart Technologies, Communication and Robotics (STCR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STCR55312.2022.10009112","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.
哈希和认证高级加密标准的性能比较
当今时代正在见证物联网作为一个有前途的即将到来的领域,影响着人类生活的几乎所有领域。然而,由于设备的局限性,物联网正面临着更重大的挑战。阻碍其广泛应用的最关键挑战是安全性。安全攻击呈指数级增长,需要确保这些资源有限的设备感知到的传输数据的机密性、完整性和身份验证。尽管轻量级加密的新领域正试图保护低端设备,但传统的AES块密码仍然是首选,因为缺乏解决所有三个安全方面的标准轻量级加密原语。此外,各种完整性和身份验证攻击仍然可能危及加密的数据,这证明需要散列和MAC算法。在本文中,两种哈希(MD5和SHA-256)和一种认证(HMAC)技术在标准和经过良好测试的ARM mBed TLS库中可用,并与AES块密码一起使用,以实现多级安全。所有这些原语都已在KEIL MDK IDE和基于ARM cortex - m3的LPC1768硬件开发物联网平台上实现。此外,使用ULINKpro和ULINKplus调试适配器,对这些原语进行了实时分析和比较,涉及各种设计指标,如执行时间、内存占用、功率和能耗。结果有助于设计人员根据各种物联网开发平台的资源可用性选择适当的加密,散列和MAC算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信