An exhaustive review of the stream ciphers and their performance analysis
The number of internet of things (IoT) applications has increased, which has increased the demand for low-resource gadgets. The data produced by these devices must be protected to guarantee security. The devices operate in conditions with limited space, computational power, memory, and energy. High-...
Saved in:
Published in | International journal of reconfigurable and embedded systems Vol. 13; no. 2; p. 360 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
01.07.2024
|
Online Access | Get full text |
Cover
Loading…
Summary: | The number of internet of things (IoT) applications has increased, which has increased the demand for low-resource gadgets. The data produced by these devices must be protected to guarantee security. The devices operate in conditions with limited space, computational power, memory, and energy. High-security standards are difficult to achieve with limited resources. The detailed analysis of various stream ciphers and their performance metrics is reviewed in this manuscript. The functionality of the stream ciphers is categorized and thoroughly discussed based on both the hardware and software viewpoints. The security attacks and their countermeasure methods using stream ciphers are discussed. The performance metrics of most hardware-based stream ciphers, including the ECRYPT stream cipher project (eSTREAM) ciphers, are discussed. Each hardware stream cipher design highlights the hardware constraints such as chip area, frequency, throughput, and hardware efficiency. The work also highlights the various applications using these stream ciphers. The current trends using these stream ciphers are discussed with futuristic goals. |
---|---|
ISSN: | 2089-4864 2722-2608 |
DOI: | 10.11591/ijres.v13.i2.pp360-371 |