Abstract
For security applications in wireless sensor networks (WSNs), choosing best algorithms in terms of energy-efficiency and of small-storage requirements is a real challenge because the sensor networks must be autonomous. In [22], the authors have benchmarked on a dedicated platform some block-ciphers using several modes of operations and have deduced the best block cipher to use in the context of WSNs.
This article proposes to study on a dedicated platform of sensors some stream ciphers. First, we sum-up the security provided by the chosen stream ciphers (especially the ones dedicated to software uses recently proposed in the European Project Ecrypt, workpackage eStream [27]) and presents some implementation tests performed on the platform [16].
Chapter PDF
Similar content being viewed by others
Keywords
References
Berbain, C., et al.: Sosemanuk: a fast oriented software-oriented stream cipher. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), http://www.ecrypt.eu.org/stream/
Bernstein, D.J.: Salsa20 specification. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), http://www.ecrypt.eu.org/stream/
Biham, E., Seberry, J.: Py: A fast and secure stream cipher using rolling arrays. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), http://www.ecrypt.eu.org/stream/
Biham, E., Seberry, J.: Pypy: Another version of py. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2006), http://www.ecrypt.eu.org/stream/
Biryukov, A.: A new 128-bit key stream cipher lex. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2006), http://www.ecrypt.eu.org/stream/
De Cannière, C.: estream optimized code HOWTO. eSTREAM, ECRYPT Stream Cipher Project (2005), http://www.ecrypt.eu.org/stream/perf/
Cho, J.Y.: An observation on dragon. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/002 (2007), http://www.ecrypt.eu.org/stream
Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)
Crowley, P.: Improved cryptanalysis of py. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/010 (2006), http://www.ecrypt.eu.org/stream
Dawson, E., et al.: Dragon: A fast word based stream cipher. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), http://www.ecrypt.eu.org/stream/
Ekdahl, P., Johansson, T.: SNOW - a new stream cipher. In: Proceedings of First NESSIE Workshop, Heverlee, Belgique (2000)
Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Kuich, W., Rozenberg, G., Salomaa, A. (eds.) DLT 2001. LNCS, vol. 2295, pp. 47–61. Springer, Heidelberg (2002)
Englund, H., Maximov, A.: Attack the dragon. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/062 (2005), http://www.ecrypt.eu.org/stream
FIPS 197. Advanced Encryption Standard. Federal Information Processing Standards Publication 197, U.S. Department of Commerce/N.I.S.T (2001)
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of rc4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Fournel, N., Fraboulet, A., Feautrier, P.: Booting and Porting Linux and uClinux on a new platform. Research Report RR2006-08, LIP - ENS Lyon (Feb. 2006)
Hawkes, P., Rose, G.: Guess-and-determine attacks on SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 37–46. Springer, Heidelberg (2003)
Housley, R.: Using advanced encryption standard (aes) counter mode with ipsec encapsulating security payload (esp). IETF, RFC 3686 (2004), http://www.rfc-archive.org/getrfc.php?rfc=3686
Isobe, T., et al.: How to break py and pypy by a chosen-iv attack. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/060 (2006), http://www.ecrypt.eu.org/stream
Available online (Nov. 2006), http://kcachegrind.sourceforge.net/
RSA laboratories. Rsa security response to weaknesses in key scheduling algorithm of rc4 (2007), available at http://www.rsasecurity.com/rsalabs/node.asp?id=2009
Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw. 2(1), 65–93 (2006)
Shamir, A., Mantin, I.: A Practical Attack on Broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152–164. Springer, Heidelberg (2002)
Mantin, I.: A practical attack on the fixed rc4 in the wep mode. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 395–411. Springer, Heidelberg (2005)
Mantin, I.: Predicting and distinguishing attacks on rc4 keystream generator. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 491–506. Springer, Heidelberg (2005)
NESSIE. Nessie phase 1: selection of primitives (2001), https://www.cryptonessie.org/
Network of Excellence in Cryptology ECRYPT. Call for stream cipher primitives, http://www.ecrypt.eu.org/stream/
Preneel, B., Paul, S., Sekar, G.: Distinguishing Attacks on the Stream Cipher Py. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 405–421. Springer, Heidelberg (2006)
Pétrot, F., Gomez, P.: Lightweight Implementation of the POSIX Threads API for an On-Chip MIPS Multiprocessor with VCI Interconnect. In: DATE 03 Embedded Software Forum, pp. 51–56 (2003)
Rivest, R.: The RC4 encryption algorithm. RSA Data Security (1992)
Available online (Nov. 2006), http://www.skyeye.org/
Watanabe, D., Biryukov, A., De Cannière, C.: A distinguishing attack of SNOW 2. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 222–233. Springer, Heidelberg (2004)
Whiting, D., et al.: Phelix - fast encryption and authentication in a single cryptographic primitive. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), http://www.ecrypt.eu.org/stream/
Wu, H.: Stream cipher hc-256. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), http://www.ecrypt.eu.org/stream/
Wu, H.: Stream cipher hc-128. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2006), http://www.ecrypt.eu.org/stream/
Wu, H., Preneel, B.: Attacking the iv setup of stream cipher lex. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/059 (2005), http://www.ecrypt.eu.org/stream
Wu, H., Preneel, B.: Differential-linear attacks against the stream cipher phelix. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/056 (2006), http://www.ecrypt.eu.org/stream
Wu, H., Preneel, B.: Key recovery attack on py and pypy with chosen ivs. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/052 (2006), http://www.ecrypt.eu.org/stream
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Fournel, N., Minier, M., Ubéda, S. (2007). Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, JJ. (eds) Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems. WISTP 2007. Lecture Notes in Computer Science, vol 4462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72354-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-72354-7_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72353-0
Online ISBN: 978-3-540-72354-7
eBook Packages: Computer ScienceComputer Science (R0)