Research Article

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Figure 5

Architecture of the security module implementing the Encrypt-then-MAC composition. The message containing sensitive data is first encrypted using an encryption key to obtain a ciphertext, then the MAC is calculated for the ciphertext. Under a generic composition the associated data can be authenticated using the MAC as illustrated.