DocumentCode :
2643235
Title :
Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints
Author :
Grossschadl, J. ; Tillich, Stefan ; Rechberger, Christian ; Hofmann, Michael ; Medwed, Marcel
Author_Institution :
Inst. for Appl. Inf. Process. & Commun., Graz Univ. of Technol.
fYear :
2007
fDate :
16-20 April 2007
Firstpage :
1
Lastpage :
6
Abstract :
Software implementations of modern block ciphers often require large lookup tables along with code size increasing optimizations like loop unrolling to reach peak performance on general-purpose processors. Therefore, block ciphers are difficult to implement efficiently on embedded devices like cell phones or sensor nodes where run-time memory and program ROM are scarce resources. In this paper, the performance, energy consumption, runtime memory requirements, and code size of the five block ciphers RC6, Rijndael, Serpent, Twofish, and XTEA on the StrongARM SA-1100 processor was analyzed and compared. Most previous evaluations of block ciphers considered performance as the sole metric of interest and did not care about memory requirements or code size. In contrast to previous work, this study of the performance and energy characteristics of block ciphers has been conducted with "lightweight" implementations which restrict the size of lookup tables to 1 kB and also impose constraints on the code size. The author found that Rijndael and RC6 can be well optimized for high performance and energy efficiency, while at the same time meeting the demand for low memory (RAM and ROM) footprint. In addition, the impact of key expansion and modes of operation on the overall performance and energy consumption of each block cipher was discussed. Simulation results show that RC6 is the most energy-efficient block cipher under memory constraints and thus the best choice for resource-restricted devices
Keywords :
cryptography; embedded systems; energy consumption; microprocessor chips; semiconductor storage; 1 kByte; RC6; Rijndael; Serpent; StrongARM SA-1100 processor; Twofish; XTEA; block cipher software implementation; code size reduction; energy evaluation; lightweight cryptography; lightweight implementations; memory constraints; memory footprint; runtime memory requirements; symmetric cipher; Cellular phones; Energy consumption; Energy efficiency; Memory management; Performance analysis; Random access memory; Read only memory; Runtime; Software performance; Table lookup; Lightweight cryptography; code size reduction; energy optimization; memory footprint; symmetric cipher;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design, Automation & Test in Europe Conference & Exhibition, 2007. DATE '07
Conference_Location :
Nice
Print_ISBN :
978-3-9810801-2-4
Type :
conf
DOI :
10.1109/DATE.2007.364443
Filename :
4211953
Link To Document :
بازگشت