|Title||On the Hardware Implementation Efficiency of Cryptographic Primitives|
|Publication Type||Book Chapter|
|Year of Publication||2008|
|Authors||R. Roman, C. Alcaraz, and N. Sklavos|
|Editor||J. Lopez, and J. Zhou|
|Book Title||Wireless Sensor Network Security|
Security has been proven a crucial factor in the provision of data services and especially in the computer-related environments. While wired and wireless networks come to all sectors of everyday life, security tries to satisfy the growing needs for confidentiality, integrity and non-repudiation. There are many instances of security primitives and each one of them has different requirements in terms of processing power, word size, etc. Therefore, it is important to review the functionality of the less resource-demanding encryption algorithms in order to analyze their theoretical suitability to the existent sensor node hardware. Still, the constraints inherent to the sensor nodes advise against the total dependence on software-based implementations, even more in the case of expensive primitives.
On the Hardware Implementation Efficiency of Cryptographic Primitives