Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday
{"title":"哈希和认证高级加密标准的性能比较","authors":"Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009112","DOIUrl":null,"url":null,"abstract":"The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Performance Comparison of Hashed and Authenticated Advanced Encryption Standard\",\"authors\":\"Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday\",\"doi\":\"10.1109/STCR55312.2022.10009112\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.\",\"PeriodicalId\":338691,\"journal\":{\"name\":\"2022 Smart Technologies, Communication and Robotics (STCR)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Smart Technologies, Communication and Robotics (STCR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/STCR55312.2022.10009112\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Smart Technologies, Communication and Robotics (STCR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STCR55312.2022.10009112","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Performance Comparison of Hashed and Authenticated Advanced Encryption Standard
The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.