A Comparative Study of the TEA, XTEA, PRESENT and Simon lightweight cryptographic schemes

Bachelor Thesis (2021)
Author(s)

P.E.A. Adriaanse (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

M. Ayşen – Mentor (TU Delft - Cyber Security)

Z. Erkin – Graduation committee member (TU Delft - Cyber Security)

Willem Paul Brinkman – Mentor (TU Delft - Interactive Intelligence)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2021 P.E.A. Adriaanse
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 P.E.A. Adriaanse
Graduation Date
02-07-2021
Awarding Institution
Delft University of Technology
Project
CSE3000 Research Project
Programme
Computer Science and Engineering
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a comparative study of four of these schemes, namely TEA, XTEA, PRESENT and Simon, explaining how they work and discussing their vulnerabilities and performances. This paper specifically considers the performance of Application Specific Integrated Circuit (ASIC) implementations with regards to their size, throughput, power usage and energy usage per bit encrypted. TEA and PRESENT were found to have potentially problematic vulnerabilities, while no attacks on XTEA and Simon are known that do not reduce the number of rounds used during encryption. Simon and PRESENT were found to perform well, while XTEA implementations were found to be too large for constrained devices. Out of the four, Simon seems the most promising for use in constrained devices. As such, further research into its vulnerabilities is advisable.

Files

Research_Project_10_.pdf
(pdf | 0.475 Mb)
License info not available