Have a personal or library account? Click to login
A Survey on Lightweight Cryptographic Algorithms in IoT Cover

A Survey on Lightweight Cryptographic Algorithms in IoT

Open Access
|Mar 2024

References

  1. 1. Thakor, V. A., M. A. Razzaque, M. R. A. Khandaker. Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. – IEEE Access: Practical Innovations, Open Solutions, Vol. 9, 2021, pp. 28177-28193.
  2. 2. Hatzivasilis, G., K. Fysarakis, I. Papaefstathiou, C. Manifavas. A Review of Lightweight Block Ciphers. – Journal of Cryptographic Engineering, Vol. 8, 2018, No 2, pp. 141-184.
  3. 3. Dhanda, S. S., B. Singh, P. Jindal. Lightweight Cryptography: A Solution to Secure IoT. – Wireless Personal Communications. 2020, pp. 1947-1980.
  4. 4. Alazzam, H., O. AbuAlghanam, Q. M. Al-zoubi, A. Alsmady, E. Alhenawi. A New Network Digital Forensics Approach for Internet of Things Environment Based on Binary Owl Optimizer. – Cybernetics and Information Technologies, Vol. 22, 2022, No 3, pp. 146-160.
  5. 5. Khan, M. N., A. Rao, S. Camtepe. Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey. – IEEE Internet of Things Journal, Vol. 8, 2021, No 6, pp. 4132-4156.
  6. 6. Sallam, S., B. D. Beheshti. A Survey on Lightweight Cryptographic Algorithms. – In: Proc. of IEEE Region 10 Conference (TENCON’18), IEEE, 2018.
  7. 7. Julian Okello, W., Q. Liu, F. Ali Siddiqui, C. Zhang. A Survey of the Current State of Lightweight Cryptography for the Internet of Things. – In: Proc. of International Conference on Computer, Information and Telecommunication Systems (CITS’17), 2017, pp. 292-296.
  8. 8. Nayancy, D. S., S. Chakraborty. A Survey on Implementation of Lightweight Block Ciphers for Resource Constraints Devices. – Journal of Discrete Mathematical Sciences & Cryptography, Vol. 2020, pp. 1-22.
  9. 9. Singh, S., P. K. Sharma, S. Y. Moon, J. H. Park. Advanced Lightweight Encryption Algorithms for IoT Devices: Survey, Challenges and Solutions. – Journal of Ambient Intelligence and Humanized Computing, 2017.
  10. 10. Mousavi, S. K., A. Ghaffari, S. Besharat, H. Afshari. Security of Internet of Things Based on Cryptographic Algorithms: A Survey. – Wireless Networks, Vol. 27, 2021, No 2, pp. 1515-1555.
  11. 11. Mustafa, G., R. Ashraf, M. Mirza, A. Jamil, A. Muhammad. A Review of Data Security and Cryptographic Techniques in IoT Based Devices. – In: Proc. of 2nd International Conference on Future Networks and Distributed Systems, ACM, New York, NY, USA, 2018.
  12. 12. Fotovvat, A., G. M. E. Rahman, S. S. Vedaei, K. A. Wahid. Comparative Performance Analysis of Lightweight Cryptography Algorithms for IoT Sensor Nodes. – IEEE Internet of Things Journal, Vol. 8, 2021, No 10, pp. 8279-8290.
  13. 13. Sudha, K. S., N. Jeyanthi. A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT). – Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp. 50-72.
  14. 14. Bhardwaj, I., A. Kumar, M. Bansal. A Review on Lightweight Cryptography Algorithms for Data Security and Authentication in IoTs. – In: Proc. of 4th International Conference on Signal Processing, Computing and Control (ISPCC’17), IEEE, 2017.
  15. 15. Surendran, S., A. Nassef, B. D. Beheshti. A Survey of Cryptographic Algorithms for IoT Devices. – In: Proc. of IEEE Long Island Systems, Applications, and Technology Conference (LISAT’18), IEEE, 2018.
  16. 16. Goyal, T. K., V. Sahula, D. Kumawat. Energy Efficient Lightweight Cryptography Algorithms for IoT Devices. – IETE Journal of Research, Vol. 2019, pp. 1-14.
  17. 17. Dutta, I. K., B. Ghosh, M. Bayoumi. Lightweight Cryptography for Internet of Insecure Things: A Survey. – In: Proc. of 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC’19), IEEE, 2019.
  18. 18. Gunathilake, N. A., W. J. Buchanan, R. Asif. Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. – In: Proc. of 5th IEEE World Forum on Internet of Things (WF-IoT’19), IEEE, 2019.
  19. 19. Gunathilake, N. A., A. Al-Dubai, W. J. Buchana. Recent Advances and Trends in Lightweight Cryptography for IoT Security. – In: Proc. of 16th International Conference on Network and Service Management (CNSM’20), IEEE, 2020.
  20. 20. Dai, Y., S. Chen. Cryptanalysis of Full PRIDE Block Cipher. – Science China Information Sciences, Vol. 60, 2017, No 5.
  21. 21. Zhao, J., X. Wang, M. Wang, X. Dong. Differential Analysis on Block Cipher PRIDE. – In: Cryptology ePrint Archive. Vol. 2014.
  22. 22. Yang, Q., L. Hu, S. Sun, K. Qiao, L. Song, J. Shan, X. Ma. Improved Differential Analysis of Block Cipher PRIDE. Information Security Practice and Experience. – In: Lecture Notes in Computer Science. Cham, Springer International Publishing, 2015, pp. 209-219.
  23. 23. Lallemand, V., S. Rasoolzadeh. Differential Cryptanalysis of 18-Round PRIDE. Lecture Notes in Computer Science. – In: Lecture Notes in Computer Science. Cham, Springer International Publishing, 2017, pp. 126-146.
  24. 24. Hou, X., J. Breier, F. Zhang, Y. Liu. Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers. – In: IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2019. pp. 1-29.
  25. 25. Soleimany, H. Self-Similarity Cryptanalysis of the Block Cipher ITUbee. – IET Information Security, Vol. 9, 2015, No 3, pp. 179-184.
  26. 26. Fu, S., G. Xu, J. Pan, Z. Wang, A. Wang. Differential Fault Attack on ITUbee Block Cipher. – ACM Transactions on Embedded Computing Systems, Vol. 16, 2017, No 2, pp. 1-10.
  27. 27. Kang, Y., Q. Yu, L. Qin, G. Zhang. Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher. – Symmetry, Vol. 15, 2023, No 6, p. 1196.
  28. 28. Meier, W. On the Security of the IDEA Block Cipher. Advances in Cryptology. – In: EUROCRYPT 1993. Berlin, Heidelberg, Springer, 2007, pp. 371-385.
  29. 29. Biham, E., O. Dunkelman, N. Keller. A New Attack on 6-Round IDEA. Fast Software Encryption. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2007, pp. 211-224.
  30. 30. Biham, E., O. Dunkelman, N. Keller. New Cryptanalytic Results on IDEA. Advances in Cryptology – ASIACRYPT 2006. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2006, pp. 412-427.
  31. 31. Clavier, C., B. Gierlichs, I. Verbauwhede. Fault Analysis Study of IDEA. Topics in Cryptology – CT-RSA 2008. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2008, pp. 274-287.
  32. 32.Biryukov, A., J. Nakahara, B. J. Preneel, J. Vandewalle. New Weak-Key Classes of IDEA. Information and Communications Security. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2002, pp. 315-326.
DOI: https://doi.org/10.2478/cait-2024-0002 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 21 - 34
Submitted on: Oct 23, 2023
Accepted on: Jan 15, 2024
Published on: Mar 23, 2024
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2024 P. S. Suryateja, K. Venkata Rao, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.