Browse > Article
http://dx.doi.org/10.7471/ikeee.2019.23.3.971

Measurements of Encryption and Decryption Times of AES and LEA Algorithms on an Arduino MCU  

Kwon, Yeongjun (School of Electronic and Electrical Engineering, Hongik University)
Shin, Hyungsik (School of Electronic and Electrical Engineering, Hongik University)
Publication Information
Journal of IKEEE / v.23, no.3, 2019 , pp. 971-977 More about this Journal
Abstract
This paper presents an experimental result showing the encryption and decryption times of the AES and LEA algorithms. AES and LEA algorithms are international and Korean standards for block ciphers, respectively. Through experiments, this paper investigates the applicability of the LEA algorithm for light weight IoT devices. In order to measure the encryption and decryption times, 256-bit and 128-bit secret keys were randomly generated for AES and LEA, respectively. Under our test environment using an Arduino microcontroller, the AES algorithm takes about 45ms for encryption and decryption processes, whereas the LEA algorithm takes about 4ms. Even though processing times of each algorithm may vary much under different implementation and test environments, this experimental result shows that the LEA algorithm can be applied to many light weight IoT devices for security goals.
Keywords
block cipher; encryption; decryption; AES; LEA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Morris J. Dworkin, Elaine B. Barker, James R. Nechvatal, James Foti, Lawrence E. Bassham, E. Roback, James F. Dray Jr, "Advanced Encryption Standard (AES)," Federal Information Processing Standards (FIPS)-197, 2001. DOI: 10.6028/NIST.FIPS.197
2 Hong, D., Lee, J.K., Kim, D. C., Kwon, D., Ryu, K. H. and Lee, D. G., "LEA: A 128-bit block cipher for fast encryption on common processors," International Workshop on Information Security Applications, pp. 3-27, 2013. DOI: 10.1007/978-3-319-05149-9_1   DOI
3 NSR, "Block chiper LEA Specification," https://seed.kisa.or.kr/kisa/skill/EgovLeaInfo.do
4 KISA(KOREA INTERNET & SECURITY AGENCY) and Ministry of Science, ICT and Future Planning, "A Guide to the Use of Cryptographic Technology in the Internet of Things(IoT)," https://www.kisa.or.kr/public/laws/laws3_View.jsp?mode=view&p_No=259&b_No=259&d_No=84
5 qistoph, "ArduinoAES256," https://github.com/qistoph/ArduinoAES256
6 Frank Kagan Gurkaynak, "GALS System Design: Side Channel Attack Secure Cryptographic Accelerators" Doctoral Dissertation, ETH Zurich, 2006. https://iis-people.ee.ethz.ch/-kgf/acacia/c3.html
7 ARDUINO, "ARDUINO UNO REV3", https://media.digikey.com/pdf/Data%20Sheets/Arduino%20PDFs/A000066_Web.pdF