Skip to main content

Table 4 Comparison of execution cycles taken by the different ciphers on AVR architecture

From: RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment

CIPHER

Device

Block size (bit)

Key size (bit)

Code size (Byte)

RAM (Byte)

Cycles (key generation)

Cycles (encryption)

Cycles (decryption)

AES (Stallings 2005)

AVR

128

128

23090

720

3274

5423

5388

DES (Kumar et al. 2016)

AVR

64

64

2580

2248

2218

7046

2580

HIGHT (Kim et al. 2019)

AVR

64

128

13476

288

1412

3376

3401

LEA (Jha 2011)

AVR

128

128

3700

432

4290

3723

3784

PRESENT (Papapagiannopoulos 2016)

AVR

64

80

1738

274

2570

7447

7422

Simon (Beaulieu et al. 2014)

AVR

64

96

1370

188

2991

1980

1925

Speck(Beaulieu et al. 2014)

AVR

64

96

2552

124

1509

1179

1411

SIT(Usman et al. 2017)

AVR

64

64

826

22

2130

876

851

G-cipher (Rana et al. 2018)

AVR

64

64

1228

34

1630

792

789

RBFK-64

AVR

64

64

1228

34

1483

792

789

RBFK-128

AVR

64

128

1566

34

2966

792

789