Research Article
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN
Table 2
Underlying cryptographic algorithms utilized in the different security module configurations.
| Label | Algorithm | Type | Class | Operation mode | Service provided |
| AES-128 | AES | Symmetric cipher | Generic | CTR | Confidentiality | CBCMAC | Authentication | PRE-128 | PRESENT | Symmetric cipher | Lightweight | CTR | Confidentiality | CBCMAC | Authentication | SHA-256 | KECCAK | Hash function | Generic | HMAC | Authentication | SPO-88 | SPONGENT | Hash function | Lightweight | HMAC | Authentication |
|
|