Abstract
With the technological progress, securing information from attackers is considered a major concerning factor. Society 5.0 is a super-smart society where individuals can tackle many social issues by incorporating various industrial revolutions using smart devices. The influence of these smart devices has made the life of humankind easier and smarter. Due to the parametric changes in size and power requirements, it is tough to apply convention cryptographic procedures on these smart gadgets of Society 5.0 for information security. Generally, standard cryptographic algorithms are too energy-consuming for these embedded devices. One of the significant tools for providing security solutions to these size-limited portable devices is Lightweight Cryptography (LWC). Nowadays, researchers focus on these lightweight security algorithms to optimize maximum throughput and performance with less area and energy consumption. Hence, the current paper presents a detailed analysis of Lightweight Cryptographic cipher approaches on various platforms with their merits and demerits. Also, highlighted the features of each cipher with their performance metrics parameters. Finally, discussed the open research challenges related to the field of Lightweight Cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zahoor S, Mir RN (2018) Resource management in pervasive internet of things: a survey. J King Saud Univ Comp Inform Sci (2018)
Mohd B, Hayajneh T, Vasilakos A (2015) A survey on lightweight block ciphers for low-resource devices: comparative study and open issues. J Netw Comp Appl 58:73–93
Prakasam P, Madheswaran M, Sujith KP, Md Shohel Sayeed (2021) An enhanced energy efficient lightweight cryptography method for various IoT devices. ICT Express 7(4):487–492. ISSN 2405-9595
Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput
Gupta DN, Kumar R (2019) Lightweight cryptography: an IoT perspective. Int J Innov Technol Explor Eng (IJITEE) 8(8). ISSN: 2278-3075
Chatterjee R, Chakraborty R, JK M (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wireless Syst 1:215–224
Singh P, Chauhan R (2017) A survey on comparisons of cryptographic algorithms using certain parameters in WSN. Int J Electr Comp Eng (IJECE) 7:2232
McKay K, Feldman L, Witte G (2017) Toward standardizing lightweight cryptography, ITL bulletin, national institute of standards and technology, Gaithersburg, MD
Abed S, Jaffal R, Mohd BJ, Al-Shayeji M (2021) An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster Comput 24:3065–3084
Acosta AJ, Tena-Sánchez E, Jiménez-Fernández CJ, Mora-Merchan JM (2017) Power and energy issues on lightweight cryptography. J Low Power Electron
Bobby S (2015) Green computing techniques to power management and energy efficiency. In: Proceedings of the UGC sponsored national conference on advanced networking and applications
Hatzivasilis G, Fysarakis K, Papaefstathiou I, Manifavas C (2018) A review of lightweight block ciphers. J Cryptogr Eng 8:141–184
Al-ahdal A, Deshmukh N (2020) A systematic technical survey of lightweight cryptography on IoT environment. Int J Sci Technol Res
Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: a ultra-lightweight blockcipher. Cryptographic hardware and embedded systems (CHES). Lecture Note in Computer Science, vol 6917, pp 342–357. Springer
Deb S, Bhuyan B (2020) Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā 45(1):1–12
Venugopal V, Shila DM (2013) High throughput implementations of cryptography algorithms on GPU and FPGA. In: IEEE international instrumentation and measurement technology conference (I2MTC)
Kousalya RK, Sathish GA (2019) A survey of light-weight cryptographic algorithm for information security and hardware efficiency in resource constrained devices. In: International conference on vision towards emerging trends in communication and networking
Jadhav SP (2019) Towards light weight cryptography schemes for resource constraint devices in IoT. J Mob Multimed 15:91–110
Sardar ZA, Merkel S, Arellano A (2020) https://www.maximintegrated.com/en/design/blog/why-hardware-based-cryptography-offers-stronger-iot-design-protection.html.maximintegrated. Accessed 18 Aug 2020
Hussain HN, Hussein WN (2017) Implementation of symmetric encryption algorithms, computer engineering and intelligent systems, vol 8
Stallings W (2017) Cryptography and network security, 4/E. Tata McGraw Hill Education private limited, Pearson Education, India
De Cannière C, Dunkelman O, Knežević M (2009) KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers, cryptographic hardware and embedded systems, Springer, pp 272–288
Priya SSS, Karthigaikumar P, Teja NR (2021) FPGA implementation of AES algorithm for high speed applications. Analog Integr Circ Sig Process
Lake B, Kinsy LM (2018) Hardening AES hardware implementations against fault and error inject attacks. In: Lakes symposium on VLSI (GLSVLSI ‘18). Association for Computing Machinery, pp 499–502. New York, NY, USA, 499–502
Gong TZ, G¨uneysu T, Heyse S, Indesteege S, Ker-ckhof S, Koeune F, Nad T, Plos T, Regazzoni F, Koeune F, Standaert F (2012) Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: International conference on cryptology in Africa. Springer, pp 172–187
Castiglione A, Palmieri F, Colace F, Lombardi M, Santaniello D, D’Aniello G (2020) Securing the internet of vehicles through lightweight block ciphers. Pattern Recogn Lett 135:264–270
Lim C, Korkishko T (2006) mCrypton—a lightweight block cipher for security of low-cost RFID tags and sensors, information security applications. In: Song JS, Kwon T, Yung M (eds) Information security applications. WISA 2005. Lecture Notes in Computer Science,Springer Berlin, Heidelberg, vol 3786, pp 243–258
Mathews R, Deepa VJ (2020) Analysis of lightweight cryptographic algorithms for internet of things. Available at SSRN 3734786
Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Biryukov A (eds) Fast software encryption. FSE, Springer, Berlin
Shanmugam D, Annadurai S (2015) Secure implementation of stream cipher: Trivium. In: Bica I, Naccache D, Simion E (eds) Innovative security solutions for information technology and communications. Springer
Karmakar S, Mukhopadhyay D, Chowdhury DR (2012) CAvium—strengthening. Trivium Stream Cipher Using Cellular Automata. J Cell Autom 7:179–197
Hell M, Johansson T, Maximov A (2006) A stream cipher proposal, Grain-128. In: IEEE international symposium on information theory, Seattle, WA, pp 1614–1618
Shamir A, Kaisa N (2008) SQUASH—a new mac with provable security properties for highly constrained devices such as RFID tags. In: Fast software encryption, Springer, Lausanne, Switzerland, vol 5086, pp 144–157
Kumar N, Ojha S, Jain K, Lal S (2009) BEAN: a lightweight stream cipher. In: 2nd international conference on security of information and networks (SIN ’09), Gazimagusa, North Cyprus, pp 168–171
Agren M (2012) On some symmetric lightweight cryptographic designs. Doctoral Thesis, Department of Electrical and Information Technology, Faculty of Engineering, LTH, Lund University
Gunathilake NA, Buchanan WJ, Asif R (2019) Next generation lightweight cryptography for smart IoT devices: implementation, challenges and applications. In: IEEE 5th world forum on internet of things (WF-IoT), pp 707–710
Naito Y, Matsui M, Sugawara T, Suzuki D (2018) SAEB: a lightweight blockcipher-based AEAD mode of operation. In: IACR translation cryptographic hardware and embedded systems, pp 192–217
Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2014) RECTANGLE: a bit-slice ultra-lightweight block cipher suitable for multiple platforms. IACR Cryptol. ePrint Arch
Rana S, Hossain S, Shoun HI, Kashem MA (2018) An effective lightweight cryptographic algorithm to secure resource-constrained devices. Int J Adv Comp Sci Appl (IJACSA)
Kitsos P, Sklavos N, Parousi M, Skodras AN (2012) A comparative study of hardware architectures for lightweight block ciphers. Comput Electr Eng 38:148–160
Irwin D, Liu P, Chaudhry SR, Collier M, Wang X (2018) A performance comparison of the PRESENT lightweight cryptography algorithm on different hardware platforms. In: 29th Irish signals and systems conference (ISSC), Belfast, pp 1–5
Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Des Test Comput 24:522–533
Diehl W, Farahmand F, Yalla P, Kaps J, Gaj K (2017) Comparison of hardware and software implementations of selected lightweight block ciphers. In: 27th international conference on field programmable logic and applications (FPL), pp 1–4
Al-Aali Y, Boussakta S (2020) Lightweight block ciphers for resource-constrained devices. In: 12th international symposium on communication systems, networks and digital signal processing (CSNDSP), pp 1–6
Prabu M, Nenregen R, Kumar SS (2018) Comparing lightweight algorithms for embedded system security. Int J Pure Appl Mathe 119:14191–14198
Alizadeh M, Salleh M, Zamani M, Shayan J, Karamizadeh S (2012) Security and performance evaluation of lightweight cryptographic algorithms in RFID. In: WSEAS conference on recent researches in communications and computers, Kos Island, Greece, pp 45–50
Thorat CG, Inamdar VS (2018) Implementation of new hybrid lightweight cryptosystem. Appl Comput Inform 16:195–206
Hong D, Lee JK, Kim DC, Kwon D, Ryu KH, Lee DG (2014) LEA: a 128-bit block cipher for fast encryption on common processors. In: Kim Y, Lee H, Perrig A (eds) WISA 2013.LNCS, vol 8267, pp 3–27. Springer, Cham
Satoh A, Morioka S (2003) Hardware-focused performance comparison for the standard block ciphers AES, Camellia, and Triple-DES. In: Boyd C, Mao W (eds) Information security. ISC 2003. Lecture Notes in Computer Science, vol 2851. Springer, Berlin
Mohd BJ, Hayajneh T, Khalaf ZA, Ahmad Yousef KM (2016) Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation. Secur Commun Netw 9:2200–2216
Léglise P, Standaer FX, Rouvroy G, Quisquater JJ (2005) Efficient implementation of recent stream ciphers on reconfigurable hardware devices. In: 26th symposium on information theory in the Benelux, pp 261–268
Piret G, Roche T, Carlet C (2012) PICARO—a block cipher allowing efficient higher-order side-channel resistance. In: Bao F, Samarati P, Zhou J (eds) Applied cryptography and network security. ACNS
Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 4th international conference on signal processing, computing and control (ISPCC). doi: https://doi.org/10.1109/ISPCC.2017.8269731
Ravi S, Raghunathan A, Kocher P, Hattangady S (2004) Security in embedded systems. ACM Trans Embed Comput Syst 3:461–491
Naru ER, Saini H, Sharma M (2017) A recent review on lightweight cryptography in IoT. In: International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp 887–890, Palladam, India
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sandhya, C.P., Manjith, B.C. (2022). Challenging Aspects of Data Preserving Algorithms in IoT Enabled Smart Societies. In: Srinivasa, K.G., Siddesh, G.M., Manisekhar, S.R. (eds) Society 5.0: Smart Future Towards Enhancing the Quality of Society. Advances in Sustainability Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-19-2161-2_6
Download citation
DOI: https://doi.org/10.1007/978-981-19-2161-2_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2160-5
Online ISBN: 978-981-19-2161-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)