Research Article

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Table 1

Security results for different authenticated encryption schemes under the assumption that is IND-CPA secure and that is SUF-CMA secure, retrieved from [12]. The notion of IND-CPA security for is used since it is the weakest security notion (compared with IND-CCA), yet it is sufficient to achieve IND-CCA security under .

Composition Method ConfidentialityAuthentication
IND-CPAIND-CCAINT-PTXTINT-CTXT

Encrypt-and-MACInsecureInsecureSecureInsecure
MAC-then-encryptSecureInsecureSecureInsecure
Encrypt-then-MACSecureSecureSecureSecure