Architectural Evaluation of Asymmetric Algorithms in ARM Processors Gustavo S. Quirino and Edward David Moreno UFS/PROCC, Aracaju, Brasil Email: {gucefet, edwdavid}@gmail.com AbstractThis paper presents the performance evaluation of asymmetric cryptographic algorithms oriented to embedded platforms used in Wireless Sensor Networks (WSN). The algorithms RSA, ECC and MQQ were evaluated on ARM platform. We have used three criteria in our comparison: the processing time, memory and processor usage. We used the SimpleScalar tool for our simulations analysis. The MQQ algorithm achieved the best results in most of the evaluated criteria. Considering the same key sizes, the processing time for MQQ is at least 16 times smaller than the ECC and 230 times smaller than RSA. Regarding memory consumption, the MQQ had an occupation 61% lower than the RSA and 24% less than in the ECC. Besides these, other criteria such as misses on cache level 1, branches, replacements and write-backs were recorded in order to improve our assessment. Finally, we show the MQQ is a good algorithm for embedded systems since it is better than ECC e RSA. Index TermsEmbedded systems, Public-key cryptosystems, Performance Analysis and Design Aids. I. INTRODUCTION A Wireless Sensor Network (WSN) is composed of autonomous devices called sensor nodes that generally have low computational power, limited data transmission and power constraints. A WSN consists of sensor nodes that capturing information from an environment, processing data and transmitting them via radio signals. WSNs are increasingly present in our days and can be found in environmental area (climatic measurements, presence of smoke), in health area (measurement of vital signs, temperature), home automation (motion sensor and image sensor) and other areas. Generally, WSNs have no fixed structure, and in many cases there is no monitoring station of sensor nodes during the operational life of the network, so a WSN must have mechanisms for self- configuration and adaptation in case of failure, inclusion or exclusion of a sensor node. Security requirements of WSNs are similar to conventional computer networks, therefore parameters such as confidentiality, integrity, availability and authenticity must be taken into account in creation of a network environment. Due to limitations of WSNs, not all security solutions designed for conventional computer networks can be implemented directly in WSN. For a Manuscript received January 23, 2013; revised March 13, 2013. long time, it was believed that the public-key cryptography was not suitable for WSNs because it was required high processing power, but through studies of encryption algorithms based on curves was verified the feasibility of that technique in WSN. The cryptographic algorithm RSA is currently the most used among the asymmetric algorithms, working from the difficulty of factoring large prime numbers. Standardized by National Institute of Standard and Technology (NIST), this algorithm is widely used in transactions on the Internet. The Elliptic Curve Cryptography (ECC) was created in 80s, and are based on the difficulty of solving the discrete logarithm problem on elliptic curves. Despite its complexity the algorithm based on elliptic have been extensively studied in academia. Recently, the public-key algorithm called Multivariate Quadratic Almost Group (MQQ) was proposed in academia. Experiments performed in the FPGA and PC platforms showed that MQQ is faster than algorithms such as RSA and ECC [1, 2]. Algorithms involved in this study are asymmetric, but each one works with a specific encryption mode. Many studies have evaluated performance of cryptographic algorithms in WSNs, but there is no standardization in the performance analysis. As stated by Margi [3] studies on performance evaluation of cryptographic algorithms for WSNs are often quite different in terms of methodology, platform, metrics and focus of analysis, what difficult a direct comparison among the obtained results. Thus, this paper describes a theoretical study of cryptographic such as RSA, ECC and MQQ as well as the performance analysis of these algorithms in ARM embedded platforms used in wireless sensor networks. This paper is organized as follows. Section II gives some background about asymmetric algorithms RSA, ECC and MQQ. Section III discusses on the implementations and observation in the performance evaluation. Finally, some concluding remarks and planning for future works are outlined in Section IV. II. ASSYMETRIC ALGORITHMS The IEEE 802.15.4 standard of 2011 defines parameters for low-range personal area networks (LR- WPANs). The first version of this standard was launched in 2003, and the second one [4] was appointed to be the standard communication protocol for WSNs. The encryption mechanism specified in IEEE 802.15.4 standard is based on encryption symmetric key. But International Journal of Electronics and Electrical Engineering Vol. 1, No. 1, March 2013 39 ©2013 Engineering and Technology Publishing doi: 10.12720/ijeee.1.1.39-43