Research Article
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
Table 3
Power consumption of the analyzed algorithms.
| Cipher | Key length | Number of rounds | Procedure | Power (mW) | Max | Avg. |
| PRESENT | 80 | 31 | Encryption | 1.6383 | 0.9548 | Decryption | 1.6374 | 0.9591 |
| CLEFIA | 128 | 18 | Encryption | 1.6036 | 0.9186 | Decryption | 1.6123 | 0.9187 | 192 | 22 | Encryption | 1.6040 | 0.9482 | Decryption | 1.6142 | 0.9527 | 256 | 26 | Encryption | 1.6040 | 0.9482 | Decryption | 1.6141 | 0.9579 |
| PICCOLO | 80 | 25 | Encryption | 1.1419 | 0.8439 | Decryption | 1.1768 | 0.8449 | 128 | 31 | Encryption | 1.1886 | 0.8495 | Decryption | 1.2431 | 0.8516 |
| PRINCE | 128 | 12 | Encryption | 1.1694 | 0.7578 | Decryption | 1.2797 | 0.7621 |
| LBLOCK | 80 | 32 | Encryption | 0.8295 | 0.5799 | Decryption | 0.8605 | 0.5894 |
|
|