Security and Communication Networks / 2018 / Article / Tab 5 / Research Article
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN Table 5 Qualitative comparison of our proposed solutions with works from the literature.
Scheme Ref. Privacy Integrity/Auth. Supports AD Patented Calls CCM [11 ] CTR CBC-MAC Yes No GCM [20 ] CTR GHASH Yes No OCB [21 ] Cipher Checksum Yes Yes SOSEMANUK-MAC [22 ] Stream cipher Dragon-MAC Yes No HC 128-MAC [22 ] Stream cipher Dragon-MAC Yes No Rabbit-MAC [22 ] Stream cipher Dragon-MAC Yes No TinyAEAD [19 ] Cipher MMO Yes No PFC-CTR [14 , 15 ] CTR PFC No No PFC-OCB [14 , 15 ] OCB PFC No No IAR-CTR [16 ] CTR PFC No No IAR-CFB [16 ] CFB PFC No No RT-OCFB [17 ] OCFB No No No PFX-CTR [18 ] CTR PFC No No PFX-INC [18 ] CTR PFC No No CTR-CBCMAC This work. CTR CBC-MAC Yes No CTR-HMAC This work. CTR HMAC Yes No
represents the number of message blocks;
represents the number of hash calls.
The authors indicate that this is an increment similar to the one used in GCM or CCM
.