
Table 2: Application-specific suitability of LWHFs.
Application Recommended LWHF
Low-Power
(Battery-powered, energy-efficient)
ESCH
Memory-Constrained
(Limited ROM/RAM availability)
PHOTON-Beetle
ASCON
High-Speed Execution
(Real-time, high-throughput processing)
ESCH
Security critical
(Robust against side-channel attacks)
ISAP
As is clear from Figure 6, there is not a single op-
timal LWHF for every scenario. This suggests that
the choice of hash function is based on the specific
application requirements. Also, different microcon-
troller (MCU) architectures impact the choice of an
appropriate LWHF for real-world deployments. Ta-
ble 2 outlines the most suitable LWHFs for various
application scenarios best suited for each use case.
5 CONCLUSION
This paper presents a comprehensive benchmarking
of the five finalist LWHFs from the NIST standard-
ization process using the ChipWhisperer platform
with an ATxmega128 microcontroller as the target.
We evaluate key performance metrics including CPB,
RAM usage, ROM footprint, and energy consump-
tion, using hardware-specific profiling and optimized
compilation techniques that ensure precise and re-
liable measurements. Our measurements reveal in-
herent trade-offs among the different LWHFs, where
achieving faster execution often comes at the cost of
higher memory and energy consumption. This em-
phasizes that the selection of an optimal LWHF is
highly application-dependent.
ACKNOWLEDGEMENTS
The authors acknowledge the use of AI tools in
preparing this paper, including Grammarly for gram-
mar and style correction and OpenAI ChatGPT and
Microsoft CoPilot for refining certain sections. The
final content has been reviewed for accuracy and
alignment with the research contributions.
REFERENCES
Bao, Z., Chakraborti, A., Datta, N., Guo, J., Nandi, M.,
Peyrin, T., and Yasuda, K. (2021). Photon-beetle au-
thenticated encryption and hash family (2020). Sub-
mission to the NIST Lightweight Competition.
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S.,
Weeks, B., and Wingers, L. (2015). The Simon and
Speck block ciphers on AVR 8-bit microcontrollers.
In Eisenbarth, T. and
¨
Ozt
¨
urk, E., editors, Lightweight
Cryptography for Security and Privacy, pages 3–20,
Cham. Springer International Publishing.
Beierle, C., Biryukov, A., Cardoso dos Santos, L.,
Großsch
¨
adl, J., Perrin, L., Udovenko, A., Velichkov,
V., and Wang, Q. (2020). Lightweight aead and hash-
ing using the sparkle permutation family. IACR Trans-
actions on Symmetric Cryptology, 2020(S1):208–261.
Daemen, J., Hoffert, S., Peeters, M., Van Assche, G., and
Van Keer, R. (2020). Xoodyak, a lightweight cryp-
tographic scheme. IACR Transactions on Symmetric
Cryptology, pages 60–87.
Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F.,
and Unterluggauer, T. (2017). Isap–towards side-
channel secure authenticated encryption. IACR Trans-
actions on Symmetric Cryptology, pages 80–105.
Dobraunig, C., Eichlseder, M., Mendel, F., and Schl
¨
affer,
M. (2021). Ascon v1. 2: Lightweight authenticated
encryption and hashing. Journal of Cryptology, 34:1–
42.
Guo, J., Peyrin, T., and Poschmann, A. (2011). The pho-
ton family of lightweight hash functions. In Rogaway,
P., editor, Advances in Cryptology – CRYPTO 2011,
pages 222–239, Berlin, Heidelberg. Springer Berlin
Heidelberg.
Huang, Y., Li, S., Sun, W., Dai, X., and Zhu, W. (2021).
HVH: A lightweight hash function based on dual
pseudo-random transformation. In Security, Privacy,
and Anonymity in Computation, Communication, and
Storage, pages 492–505, Cham. Springer Interna-
tional Publishing.
Khan, S., Lee, W.-K., Karmakar, A., Mera, J. M. B., Ma-
jeed, A., and Hwang, S. O. (2023). Area–time efficient
implementation of nist lightweight hash functions tar-
geting iot applications. IEEE Internet of Things Jour-
nal, 10(9):8083–8095.
Turan, M. S., McKay, K. A., C¸ alik, C¸ ., Chang, D., Bassham,
L., et al. (2019). Status report on the first round
of the nist lightweight cryptography standardization
process. National Institute of Standards and Tech-
nology, Gaithersburg, MD, NIST Interagency/Internal
Rep.(NISTIR), 108.
Turan, M. S., Turan, M. S., McKay, K., Chang, D.,
Bassham, L. E., Kang, J., Waller, N. D., Kelsey, J. M.,
and Hong, D. (2023). Status report on the final round
of the NIST lightweight cryptography standardization
process. US Department of Commerce, National In-
stitute of Standards and Technology.
Turan, M. S., Turan, M. S., McKay, K., Chang, D., Calik,
C., Bassham, L., Kang, J., and Kelsey, J. (2021). Sta-
tus report on the second round of the nist lightweight
cryptography standardization process.
Windarta, S., Suryadi, S., Ramli, K., Pranggono, B., and
Gunawan, T. S. (2022). Lightweight cryptographic
hash functions: Design trends, comparative study, and
future directions. IEEE Access, 10:82272–82294.
Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhisperer
695