Research Article

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Table 5

Qualitative comparison of our proposed solutions with works from the literature.

Scheme Ref. Privacy Integrity/Auth. Supports AD Patented Calls

CCM [11] CTR CBC-MAC Yes No
GCM [20] CTR GHASH Yes No
OCB [21] Cipher Checksum Yes Yes
SOSEMANUK-MAC [22] Stream cipher Dragon-MAC Yes No
HC 128-MAC [22] Stream cipher Dragon-MAC Yes No
Rabbit-MAC [22] Stream cipher Dragon-MAC Yes No
TinyAEAD [19] Cipher MMO Yes No
PFC-CTR [14, 15] CTR PFC No No
PFC-OCB [14, 15] OCB PFC No No
IAR-CTR [16] CTR PFC No No
IAR-CFB [16] CFB PFC No No
RT-OCFB [17] OCFB No No No
PFX-CTR [18] CTR PFC No No
PFX-INC [18] CTR PFC No No
CTR-CBCMAC This work. CTR CBC-MAC Yes No
CTR-HMAC This work. CTR HMAC Yes No

represents the number of message blocks; represents the number of hash calls.
The authors indicate that this is an increment similar to the one used in GCM or CCM.