Int J Inf & Commun Technol ISSN: 2252-8776
Symmetrical cryptographic algorithms in the lightweight internet of things (Akshaya Dhingra)
313
conventional cryptography, which addresses traditional encryption issues with features such devices have,
like minimal memory and low processing power. The article focuses on SLCAs and their types based on
structure formation. Overall, the article highlights the importance of SLCAs for achieving cybersecurity
objectives for resource-constrained IoT devices.
REFERENCES
[1] M. Jabeen and K. Ishaq, “Internet of things in telecommunications: a technological perspective,” Journal of Information
Technology Teaching Cases, vol. 13, no. 1, pp. 39–49, May 2023, doi: 10.1177/20438869211067808.
[2] K. A. McKay, L. Bassham, M. S. Turan, and N. Mouha, “Report on lightweight cryptography,” Gaithersburg, MD, Mar. 2017.
doi: 10.6028/NIST.IR.8114.
[3] A. Banafa, “3 major challenges IoT is facing | OpenMind,” OpenMind, no. March 2017, pp. 1–9, 2017, [Online]. Available:
https://www.bbvaopenmind.com/en/technology/digital-world/3-major-challenges-facing-iot/.
[4] M. Rana, Q. Mamun, and R. Islam, “Lightweight cryptography in IoT networks: a survey,” Future Generation Computer Systems,
vol. 129, pp. 77–89, Apr. 2022, doi: 10.1016/j.future.2021.11.011.
[5] V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, “Lightweight cryptography for IoT: a state-of-the-art,” arXiv, 2020.
[6] D. N. Gupta and R. Kumar, “Lightweight cryptography: an IoT perspective,” International Journal of Innovative Technology and
Exploring Engineering, vol. 8, no. 8, pp. 700–706, 2019.
[7] T. A. S. Srinivas, A. D. Donald, I. D. Srihith, D. Anjali, and A. Chandana, “Small but mighty: the power of lightweight
cryptography in IoT,” International Journal of Advanced Research in Science, Communication and Technology, pp. 52–67,
Apr. 2023, doi: 10.48175/ijarsct-9008.
[8] S. M. Rajesh and R. Prabha, “Lightweight cryptographic approach to address the security issues in intelligent applications:
a survey,” in IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things,
Proceedings, Jan. 2023, pp. 122–128, doi: 10.1109/IDCIoT56793.2023.10053412.
[9] T. K. Goyal, V. Sahula, and D. Kumawat, “Energy efficient lightweight cryptography algorithms for IoT devices,” IETE Journal
of Research, vol. 68, no. 3, pp. 1722–1735, May 2022, doi: 10.1080/03772063.2019.1670103.
[10] C. De Canniere and B. P. Trivium, New Stream Cipher Designs, vol. 4986. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008.
[11] Hellman, “ChaCha, a variant of Salsa20,” Workshop Record of SASC, pp. 1–6, 2008, [Online]. Available:
http://cr.yp.to/chacha/chacha-20080120.pdf.
[12] L. Jiao, Y. Hao, and D. Feng, “Stream cipher designs: a review,” Science China Information Sciences, vol. 63, no. 3, p. 131101,
Mar. 2020, doi: 10.1007/s11432-018-9929-x.
[13] L. R. Simpson, E. Dawson, J. D. Golić, and W. L. Millan, “LILI keystream generator,” in Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2012, 2001, pp. 248–261.
[14] S. Babbage and M. Dodd, “The stream cipher MICKEY 2.0,” ECRYPT Stream Cipher Project, Report, pp. 1–12, 2006.
[15] C. De Canniere and B. Preneel, “TRIVIUM specifications,” ECRYPT Stream Cipher Project, Report, vol. 30, p. 2005, 2005.
[16] A. Chakraborti, A. Chattopadhyay, M. Hassan, and M. Nandi, “TriviA: a fast and secure authenticated encryption scheme,” in
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol. 9293, 2015, pp. 330–353.
[17] A. Canteaut et al., “Stream ciphers: a practical solution for efficient Homomorphic-Ciphertext compression,” in Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9783,
2016, pp. 313–333.
[18] V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, “Lightweight cryptography algorithms for resource-constrained IoT
devices: a review, comparison and research opportunities,” IEEE Access, vol. 9, pp. 28177–28193, 2021,
doi: 10.1109/ACCESS.2021.3052867.
[19] A. Bogdanov et al., “PRESENT: an ultra-lightweight block cipher,” in Cryptographic Hardware and Embedded Systems - CHES
2007, vol. 4727 LNCS, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 450–466.
[20] S. Banik. et al., “GIFT-COFB,” IACR Cryptology ePrint Archive, 2020.
[21] A. Poschmann, G. Leander, K. Schramm, and C. Paar, “New light-weight crypto algorithms for RFID,” in Proceedings - IEEE
International Symposium on Circuits and Systems, May 2007, pp. 1843–1846, doi: 10.1109/iscas.2007.378273.
[22] P. Israsena and S. Wongnamkum, “Hardware implementation of a TEA-based lightweight encryption for RFID security,” in RFID
Security, Boston, MA: Springer US, 2008, pp. 417–433.
[23] J. Hosseinzadeh, “A comprehensive survey on evaluation of lightweight symmetric ciphers : hardware and software
implementation,” ACSIJ Advances in Computer Science, vol. 5, no. 4, pp. 31–41, 2016.
[24] R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, and L. Wingers, “The SIMON and SPECK lightweight block
cIPhers,” in Proceedings - Design Automation Conference, Jun. 2015, vol. 2015-July, pp. 1–6, doi: 10.1145/2744769.2747946.
[25] D. Hong et al., “HIGHT: a new block cipher suitable for low-resource device,” in Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4249 LNCS, 2006, pp. 46–59.
[26] C. De Cannière, O. Dunkelman, and M. Knežević, “KATAN and KTANTAN - a family of small and efficient hardware-oriented
block ciphers,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 5747 LNCS, 2009, pp. 272–288.
[27] S. Das, “Halka: a lightweight, software friendly block cipher using ultra-lightweight 8-bit S-box,” IACR Cryptology ePrint
Archive, vol. 2014, p. 110, 2014, [Online]. Available: http://dblp.uni-trier.de/db/journals/iacr/iacr2014.html#Das14a.
[28] G. Bansod, N. Raval, and N. Pisharoty, “Implementation of a new lightweight encryption design for embedded security,” IEEE
Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 142–151, Jan. 2015, doi: 10.1109/TIFS.2014.2365734.
[29] Z. A.Mohammed and K. A. Hussein, “Lightweight cryptography concepts and algorithms: a survey,” in 2023 Second
International Conference on Advanced Computer Applications (ACA) , Feb. 2023, pp. 1 –7, doi:
10.1109/ACA57612.2023.10346914.
[30] Cryptrec, “CRYPTREC cryptographic technology guideline (lightweight cryptography),” CRYPTREC: Lightweight Cryptography
Working Group, no. March, pp. 1–127, 2017, [Online]. Available: https://www.cryptrec.go.jp/report/cryptrec-gl-2003-2016en.pdf.
[31] A. J. Acosta, E. Tena-Sánchez, C. J. Jiménez, and J. M. Mora, “Power and energy issues on lightweight cryptography,” Journal of
Low Power Electronics, vol. 13, no. 3, pp. 326–337, Sep. 2017, doi: 10.1166/jolpe.2017.1490.