Research Article
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
Table 4
Current measurements of the analyzed algorithms.
| Cipher | Key length | Number of rounds | Procedure | Current (mA) | Max | Avg. |
| PRESENT | 80 | 31 | Encryption | 0.4982 | 0.2905 | Decryption | 0.4980 | 0.2918 |
| CLEFIA | 128 | 18 | Encryption | 0.4877 | 0.2795 | Decryption | 0.4905 | 0.2795 | 192 | 22 | Encryption | 0.4877 | 0.2885 | Decryption | 0.4911 | 0.2899 | 256 | 26 | Encryption | 0.4877 | 0.2885 | Decryption | 0.4909 | 0.2914 |
| PICCOLO | 80 | 25 | Encryption | 0.3472 | 0.2568 | Decryption | 0.3579 | 0.2570 | 128 | 31 | Encryption | 0.3614 | 0.2585 | Decryption | 0.3782 | 0.2591 |
| PRINCE | 128 | 12 | Encryption | 0.3863 | 0.2306 | Decryption | 0.3892 | 0.2319 |
| LBLOCK | 80 | 32 | Encryption | 0.2522 | 0.1764 | Decryption | 0.2617 | 0.1793 |
|
|