IoT Security : Performance Evaluation of Grain , MICKEY , and Trivium-Lightweight Stream Ciphers

In this paper, we evaluate the software implementation of eSTREAM Profile II finalists (Grain, MICKEY, and Trivium) on a NodeMCU development kit 1.0 microcontroller. The NodeMCU is programmed by Arduino IDE to run a C++ code that awaits TCP communication over a WiFi network to encrypt or decrypt text using these lightweight stream ciphers. Throughput performance of the cipher implementations on the NodeMCU device is measured and compared, as well as the overall WiFi network roundtrip execution time. Using these performance figures, we consider the suitability of these cipher algorithms as software implementations in IoT applications. Additionally, we consider the software and hardware implementation tradeoffs, as well as the device’s power consumption running the stream ciphers.

[1]  Dipanwita Roy Chowdhury,et al.  Differential Fault Analysis of MICKEY-128 2.0 , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[2]  Wen-Feng Qi,et al.  Improved conditional differential attacks on Grain v1 , 2017, IET Inf. Secur..

[3]  Debdeep Mukhopadhyay,et al.  A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[4]  Fred Piper,et al.  Stream Ciphers , 1982, EUROCRYPT.

[5]  B. Preneel,et al.  Trivium Specifications ? , 2022 .

[6]  Ahmad-Reza Sadeghi,et al.  Security analysis on consumer and industrial IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

[7]  Martin Hell,et al.  A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.

[8]  Vincent Rijmen,et al.  The eSTREAM Portfolio , 2008 .

[9]  Christof Paar,et al.  Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers , 2008, 2008 International Symposium on Industrial Embedded Systems.

[10]  Amir Akbari,et al.  Grain and Trivium ciphers implementation algorithm in FPGA chip and AVR micro controller , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).

[11]  Mohey M. Hadhoud,et al.  Studying the Effects of Most Common Encryption Algorithms , 2011, Int. Arab. J. e Technol..

[12]  Nozomu Togawa,et al.  Scan-based attack against Trivium stream cipher independent of scan structure , 2013, 2013 IEEE 10th International Conference on ASIC.

[13]  Nicky Mouha,et al.  Report on Lightweight Cryptography , 2017 .

[14]  Saad Islam,et al.  Cube attack on Trivium and A5/1 stream ciphers , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).

[15]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[16]  Martin Hell,et al.  Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..