Review Article
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Table 3
Authenticated encryption algorithms security comparison.
| Algorithm | Provable confidentiality | Provable authenticity | Nonce misuse resistance | Side channel attacks |
| AES-GCM [142] | √ | × | × | Cache attack [143], Fault attack [70] | ACORN_v3 [144] | √ | √ | × | Fault attack [132] | ASCON_v1.2 [145] | √ | √ | × | × | AES-CLOC [112] | √ | √ | × | Fault attack [146] | JOLTIK [147] | √ | √ | √ | × | PRIMATEs [148] | √ | √ | √ | × | SCREAM [149] | √ | √ | × | √ | SILC-AES [150] | √ | √ | × | × | SILC-LED [150] | √ | √ | × | × | AEGIS [151] | × | × | × | × | COLM [152] | √ | √ | √ | × | DeoxysI [153] | √ | √ | × | × | DeoxysII [153] | √ | √ | √ | × | OCB [102] | √ | √ | √ | × | NORX [154] | √ | √ | × | × | AES-JAMBU [155] | × | × | √ | × | Tiaoxin [156] | × | × | × | Fault attack [157] | AEZ [158] | √ | √ | × | Fault attack [129] | Ketje_v2 [159] | √ | √ | × | × | Keyak [160] | √ | √ | × | × | MORUS_v2 [161] | × | × | × | × |
|
|