About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

Research Article

Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-17081-2_5,
        author={Razvan Raducu and Ricardo J. Rodr\^{\i}guez and Pedro \^{A}lvarez},
        title={Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices},
        proceedings={Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings},
        proceedings_a={AC3},
        year={2022},
        month={10},
        keywords={Performance evaluation Memory usage Cryptographic libraries Resource-constrained devices},
        doi={10.1007/978-3-031-17081-2_5}
    }
    
  • Razvan Raducu
    Ricardo J. Rodríguez
    Pedro Álvarez
    Year: 2022
    Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices
    AC3
    Springer
    DOI: 10.1007/978-3-031-17081-2_5
Razvan Raducu1,*, Ricardo J. Rodríguez1, Pedro Álvarez1
  • 1: Dpto. de Informática e Ingeniería de Sistemas
*Contact email: razvan@unizar.es

Abstract

With the constant growth of IoT devices, software performance and memory usage have become relevant aspects when choosing the most suitable and optimal configuration of these resource-constrained devices. Moreover, in certain scenarios security must be guaranteed to protect data confidentiality, which imposes another resource consumption overhead. In this work-in-progress we evaluate the resource consumption of two widely-used block ciphers (AES and 3DES) and stream ciphers (Salsa20 and Chacha20), implemented in two C++ libraries (Crypto++andBotan), to find out which library and algorithms are the most efficient for such devices. In addition, we also evaluate whether the type of input data affects the resource consumption. Our results show that the memory consumption is similar across both libraries and algorithms. In terms of CPU,Crypto++outperformsBotan, with ChaCha20 achieving the best performance rates. Regarding the type of input data, no major impact has been noticed.

Keywords
Performance evaluation Memory usage Cryptographic libraries Resource-constrained devices
Published
2022-10-06
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-17081-2_5
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL