Research Article
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
Table 2
Energy consumption of the analyzed algorithms.
| Cipher | Architecture | Block length | Key length | Number of rounds | Procedure | Energy (mJ) |
| PRESENT | SPN | 64 | 80 | 31 | Encryption | 9.523 | Decryption | 9.573 |
| CLEFIA | Feistel | 128 | 128 | 18 | Encryption | 9.128 | Decryption | 9.128 | 192 | 22 | Encryption | 9.452 | Decryption | 9.494 | 256 | 26 | Encryption | 9.452 | Decryption | 9.575 |
| PICCOLO | Feistel | 64 | 80 | 25 | Encryption | 8.487 | Decryption | 8.490 | 128 | 31 | Encryption | 8.533 | Decryption | 8.547 |
| PRINCE | SPN | 64 | 128 | 12 | Encryption | 7.513 | Decryption | 7.549 |
| LBLOCK | Feistel | 64 | 80 | 32 | Encryption | 5.812 | Decryption | 5.924 |
|
|