Research Article

Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications

Table 2

Energy consumption of the analyzed algorithms.

CipherArchitectureBlock lengthKey lengthNumber of roundsProcedureEnergy (mJ)

PRESENTSPN648031Encryption9.523
Decryption9.573

CLEFIAFeistel12812818Encryption9.128
Decryption9.128
19222Encryption9.452
Decryption9.494
25626Encryption9.452
Decryption9.575

PICCOLOFeistel648025Encryption8.487
Decryption8.490
12831Encryption8.533
Decryption8.547

PRINCESPN6412812Encryption7.513
Decryption7.549

LBLOCKFeistel648032Encryption5.812
Decryption5.924