Review Article
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Table 4
Characteristics of authenticated encryption candidates, v means variable.
| Algorithm | Message | Key | Nonce | Tag | Online | Parallel (E/D) | Inverse free | Intermediate tag | AEAD |
| AES-GCM | 128 | 128 | 96 | 128 | √ | √/× | × | × | √ | ACORN | 128 | 128 | 128 | 128 | √ | √/√ | √ | × | √ | ASCON | 128 | 128 | 128 | 128 | √ | ×/× | √ | × | √ | CLOC | 128 | 128 | 96 | 64 | √ | ×/× | √ | × | √ | JOLTIK | 128 | 128 | 32 | 64 | √ | √/√ | × | × | √ | PRIMATEs | 80 | 80 | 80 | 80 | √ | ×/× | √ | × | √ | 120 | 120 | 120 | 120 | √ | ×/× | √ | × | √ | SCREAM | 128 | 128 | 96 | 128 | √ | √/√ | √ | × | √ | SILC-AES | 128 | 128 | 64 | 128 | √ | ×/√ | √ | × | √ | 96 | 112 | Aegis | 128 | 128 | 128 | 128 | √ | √/× | √ | × | √ | 256 | 256 | 256 | 128 | √ | √/× | √ | × | √ | COLM | 128 | 128 | 64 | 128 | √ | √/√ | √ | √ | √ | DeoxysI | V | 128 | 64 | 128 | √ | √/√ | × | × | √ | DeoxysII | V | 128 | 120 | 128 | √ | √/√ | × | × | √ | OCB | 128 | 128 | 128 | 64 | √ | √/√ | × | × | √ | NORX | V | 96 | 32 | 96 | √ | √/√ | √ | × | √ | SILC-LED | 64 | 80 | 48 | 32 | √ | ×/√ | √ | × | √ | AES-JAMBU | 128 | 128 | 64 | 64 | √ | ×/× | √ | × | √ | Tiaoxin | 128 | 128 | 128 | 128 | √ | √/√ | √ | × | √ | AEZ | V | 384 | 128 | 128 | × | √/√ | √ | × | √ | Ketje | 128 | 128 | 128 | 128 | √ | ×/× | √ | √ | √ | Keyak | V | 288 | V | 128 | √ | √/× | √ | √ | √ | MORUS | 128 | 128 | 128 | 128 | √ | ×/× | √ | × | √ |
|
|