Research Article
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
Table 6
Active mode ratios for the analyzed algorithms.
| Cipher | Key length | Number of rounds | Procedure | Active mode (time) | Active mode (energy) |
| PRESENT | 80 | 31 | Encryption | %15.5 | %23.0 | Decryption | %15.8 | %23.0 |
| CLEFIA | 128 | 18 | Encryption | %9.9 | %14.7 | Decryption | %10.0 | %14.8 | 192 | 22 | Encryption | %14.0 | %20.4 | Decryption | %14.0 | %20.3 | 256 | 26 | Encryption | %15.4 | %22.1 | Decryption | %15.4 | %22.1 |
| PICCOLO | 80 | 25 | Encryption | %1.8 | %2.9 | Decryption | %1.9 | %3.1 | 128 | 31 | Encryption | %1.8 | %2.9 | Decryption | %1.9 | %3.1 |
| PRINCE | 128 | 12 | Encryption | %26.8 | %38.8 | Decryption | %26.9 | %39.0 |
| LBLOCK | 80 | 32 | Encryption | %2.2 | %3.9 | Decryption | %2.2 | %3.8 |
|
|