FELICS Stream Ciphers Brief Results

From CryptoLUX
Jump to: navigation, search

Note:

  • State, key and IV sizes are expressed in bits [b].
  • Code size (Code) and RAM consumption (RAM) are expressed in bytes [B].
  • Execution time (Time) is expressed in cycles [cyc.].
  • Details about cryptographic properties of each cipher are available here.
  • Results for assembly implementations are displayed in italic.


Scenario 1

A description of scenario 1 can be found here.

Results for scenario 1 - I: Setup + Encryption. Encrypt 128 bytes of data. For each cipher, an optimal implementation on each architecture is selected.
Cipher Info AVR MSP ARM
Cipher State [b] Key [b] IV [b] Code [B] RAM [B] Time [cyc.] Code [B] RAM [B] Time [cyc.] Code [B] RAM [B] Time [cyc.] FOM
ChaCha20 512 128 64 1042 313 53723 744 312 36999 740 380 7095 4.6
ChaCha20 512 256 64 1156 328 52737 768 328 36987 748 396 7163 4.8
Trivium 288 80 80 1130 211 92985 980 212 70602 872 300 13512 5.9
Snow3G 608 128 128 5402 865 52666 4664 864 42048 3430 880 25592 14.1


Results for scenario 1 - II: Setup. For each cipher, an optimal implementation on each architecture is selected.
Cipher Info AVR MSP ARM
Cipher State [b] Key [b] IV [b] Code [B] RAM [B] Time [cyc.] Code [B] RAM [B] Time [cyc.] Code [B] RAM [B] Time [cyc.]
ChaCha20 512 128 64 186 3 455 124 4 312 80 8 144
ChaCha20 512 256 64 288 7 412 148 4 300 88 8 120
Trivium 288 80 80 968 23 49126 892 28 37538 812 104 7195
Snow3G 608 128 128 4724 97 26634 4198 96 20152 3254 112 11996


Results for scenario 1 - III: Encryption. Encrypt 128 bytes of data. For each cipher, an optimal implementation on each architecture is selected.
Cipher Implementation AVR MSP ARM
Cipher State [b] Key [b] IV [b] Code [B] RAM [B] Time [cyc.] Code [B] RAM [B] Time [cyc.] Code [B] RAM [B] Time [cyc.]
ChaCha20 512 128 64 856 97 53268 620 96 36687 660 164 6951
ChaCha20 512 256 64 868 96 52325 620 96 36687 660 164 7043
Trivium 288 80 80 932 26 43859 748 28 33064 652 96 6317
Snow3G 608 128 128 3784 41 26032 3630 40 21896 3070 72 13596


Note:

  • State, key and IV sizes are expressed in bits [b].
  • Code size (Code) and RAM consumption (RAM) are expressed in bytes [B].
  • Execution time (Time) is expressed in cycles [cyc.].
  • Details about cryptographic properties of each cipher are available here.
  • Results for assembly implementations are displayed in italic.