Research Article
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN
Table 2
Underlying cryptographic algorithms utilized in the different security module configurations.
| | Label | Algorithm | Type | Class | Operation mode | Service provided |
| | AES-128 | AES | Symmetric cipher | Generic | CTR | Confidentiality | | CBCMAC | Authentication | | PRE-128 | PRESENT | Symmetric cipher | Lightweight | CTR | Confidentiality | | CBCMAC | Authentication | | SHA-256 | KECCAK | Hash function | Generic | HMAC | Authentication | | SPO-88 | SPONGENT | Hash function | Lightweight | HMAC | Authentication |
|
|