0% found this document useful (0 votes)
91 views8 pages

Running Head: Lightweight Cryptography

The document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptography that achieves high security levels using small computing power. It then discusses how lightweight cryptography allows applications with constrained resources like IoT devices to perform security functions efficiently. It outlines some security threats to low-power devices and how lightweight cryptography works to address them. Finally, it discusses software and hardware performance metrics and examples of lightweight cryptographic algorithms and challenges.

Uploaded by

Carlos Alphonce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views8 pages

Running Head: Lightweight Cryptography

The document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptography that achieves high security levels using small computing power. It then discusses how lightweight cryptography allows applications with constrained resources like IoT devices to perform security functions efficiently. It outlines some security threats to low-power devices and how lightweight cryptography works to address them. Finally, it discusses software and hardware performance metrics and examples of lightweight cryptographic algorithms and challenges.

Uploaded by

Carlos Alphonce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Running head: LIGHTWEIGHT CRYPTOGRAPHY

Lightweight cryptography

Name

Institution
LIGHTWEIGHT CRYPTOGRAPHY

Introduction

Cryptography refers to the process that involves a combination of the decryption and

encryption according to Andreeva, [1]. The process encompasses a plain text information being

converted into cipher text or unintelligible text and then back to the plain text. However, when a

combination of security and lightweight is considered, the process is known as lightweight

cryptography. The high levels of security are achieved using lightweight cryptography by using

only a small computing power [1]. The other notable definition of the lightweight cryptography

is a cryptographic protocol or algorithm tailored for implementation and use in the constrained

environments including the sensors, RFID tags, healthcare devices, contactless smart cards, etc.

The purpose of the lightweight cryptography is to allow a diverse range of modern

applications such as vehicle security systems, smart meters, wireless patient monitoring systems,

the internet of things and the Intelligent Transport systems to perform their respective duties with

relative ease. A wide variety of devices are helped using the lightweight cryptography which can

be implemented in various kinds of software and hardware [2].

Various features are available that assist the lightweight cryptography work optimally.

The features include the stream ciphers, the block ciphers, hash functions and so on. The

contribution of the lightweight cryptography to the security of various smart devices and objects

include its smaller footprint and efficiency [2]. The networks being used should be implemented

more primitively in combination with the lightweight primitives.

The internet of things uses a wide range of lightweight cryptography techniques. A high

number of challenges are faced by the internet of things such as the power, privacy, security,

heterogeneity, scalability, and bandwidth. The main reasons for the adoption of lightweight

cryptography are the applicability to devices having lower resources and the efficiency of the
LIGHTWEIGHT CRYPTOGRAPHY

end-to-end communication. All the benefits of the lightweight cryptography will only be realized

when the lightweight cryptography is standardized. The resource constrained devices such as the

internet of things use the lightweight encryption sector.

The paper is organized as follows. There is a bit of introduction to the lightweight

cryptography and its goals. The paper describes the potential security threats in a system using

the low powered devices and the working mechanism of the lightweight cryptography. The

performance metric of the lightweight cryptographic is analyzed in both hardware and software

performance metric. Two different lightweight cryptographic algorithms have been discussed

using details from the current literature. The existing and future challenges that face the

lightweight cryptographic shall be discussed and vivid conclusions made henceforth.

Security threats

Devices using the internet of things are constrained on the amount of energy they can use.

Such devices include RFID tags, wireless sensors, machine-to-machine microcontrollers (M2M)

and NFC tags. Cryptography is important for these devices to ensure they are fully secured and

will provide fast identification, data protection, and authentication. However, because of their

low-level usage of energy, many advantages have been confined to applicability and design and

a source of unique challenges in security.

The smaller size of the low-end energy devices regarding ROM and ROM presents a

greater security challenge. The small products such as fitness trackers, smart lighting, tire

pressure monitoring sensors, and smart watches are designed to have the smallest amount of

possible profile to satisfy the engineering and marketing needs. The devices have very little

ROM and RAM available for cryptography. Solutions for these steps still exist.
LIGHTWEIGHT CRYPTOGRAPHY

Network attacks exist in various ways such as the attacker sniffing out the confidential

information and other types of data that flows through the RFID technologies because of the

wireless characteristics. The attacker will try to access some information from inside the

organization using the port scanning and the sniffing applications.

Working mechanism

Lightweight cryptography is an important developing and attractive public key

cryptosystem that is applied to many different kinds of devices. The lightweight cryptography is

normally applied if the device cannot undertake enough cryptographic operations to ensure

adequate security. The lightweight cryptographic accommodates different kinds of limitations

related to the resource constrained environment of a lot of new application generations according

to Maimut & Ouafi (2012) [4].

The process of communication can be wireless or wired. The devices that are wireless are

powered using a battery or an electromagnetic induction. The battery being used can be

rechargeable or disposable. The power consumption or energy in some applications can be very

important, but other types of applications are just okay with low latency levels. The factors that

make the process quite limiting is the fact that the software code size or the hardware area can be

small and a very small amount of RAM can be available.

Performance metrics

The implementation for metrics in both the software and hardware are not identical

because of the cipher complexities during its operation. The bit permutation implementation

offers expensive software, but it is relatively easy to implement if we are dealing with hardware.

The look up tables is easy to be set up in software and very difficult and tough when it comes to

hardware devices.
LIGHTWEIGHT CRYPTOGRAPHY

Software performance metrics

The amount of data gathered in RAM is measured regarding the size of the tool and the

implemented information type. It contains private RAM data such as master keys, ciphered data,

initialization vectors, and round keys. The price of the microcontrollers depends on memory and

from the evidence collected from the block cipher it only needs small lower usage of the memory

Andreeva & Bilgin [1]. It has more limited hardware resource than the computers and meeting

the block cipher data memory requirements forms the main part of the microcontrollers. The

code footprint that is stored in the flash memory of the microcontroller controls the size

requirement of the microcontroller that is computed in bytes and corresponds to the footprint

code according to Shemaili & Yeun, [7]. The object files created by the compiler is used to

adjust several implementations of the block cipher size tool and the object file made by the

compiler to determine the ROM or the code size of the software Beaulieu, [2]. The execution

time of the forms the best performance metric of the software. The execution time is related to

other factors such as target device, the number of rounds and the structure of the cipher. The time

of the execution is obtained from the processor cycles commanded by a set of instructions to be

executed. The number of cycles in the processor clock is used to find the number of processor

cycles obtained from the basic cipher operations.

Hardware performance metric

The resources needed for the implementation and design of the hardware are generally

expressed concerning full custom ASIC/FPGA and gate area. In FPGA, the design provided

works towards increasing flexibility and minimizing the development costs. It contains the flip-

flops, look-up tables, and multiplexers. On the contrary, the ASIC customized design is based on

the automated design flow that reduces the design time according to Gupta & Ray 2013 [3].
LIGHTWEIGHT CRYPTOGRAPHY

Types

The three main types of the cryptographic algorithm include a public key, secret key, and

hash functions. The lightweight block cipher has smaller block sizes, simpler rounds, simpler key

schedules, and smaller key sizes. The lightweight hash functions have smaller message sizes and

smaller output size McKay,2017 [5]. The high-performance system has a customized CPU,

Crypto multicore, crypto array, and crypto processor. For example, the data encryption standards

(DES) uses the same key type to decrypt and encrypt a message and hence the receiver, and the

sender must use and know the same private key. The DES is described as being a block cipher

since they use the same kind of 64 bits size plain text blocks and returns the cipher text block of

the same type. The permutation type also called the “2x64th power) leads to possible

arrangements of the 64 bits that can either be 1 or 0. The 64 bits block is further divided into two

other blocks of 32 bits each, a right half R and the left half block L. Using the key size of the 56

size of block, operating on 64 bits block that are stored using the 64 bits long key and hence no

8th bit key was used such as the 8, 16, 24, 32, 40, 48, 56, and 64. The DES works using the

binary numbers or bits of 1s and 0s that are normally used in digital computers. The four bits

group make up the hexadecimal or base 16 number. The binary number 0001 is treated similarly

to the hexadecimal number 1 binary. 1000 is the same as the hexadecimal number 8. 1001 is

equal to the nine hexadecimal number and 1010 same to hexadecimal number 1010 while 1111

is equal to the F hexadecimal number Manifavas, 2014 [5].

Challenges

The cycle count has very few iterations having a slower simple functions. The block

cipher is developed independently in the past up to 2012. The existing technologies are

implemented differently, and very few comparative studies have been carried out because of
LIGHTWEIGHT CRYPTOGRAPHY

reduced competition and lack of standardization. The criteria used during the evaluation is

mostly relative and reflect algorithmically and choices of implementation but some have their

algorithm reflected in a better way. With fixed parameters, the interpretation has become easier

concerning issues of comparisons Matsuda & Moriai, 2012 [6]. The designer skills also impact

on the extent of comparison. The comparison of software is relatively easy to read and interpret

because of the fixed hardware including cycle count tradeoff and limited code size. The RAM

used reflects the key and state size that is applicable.

Conclusion

The paper has explained the lightweight cryptography in detail. The low resource devices

undertake their computations using the IoT environment. The devices are affected by factors

such as power functions, battery life, memory, and computation. Some algorithm is vulnerable to

certain kinds of attacks than others, and hence a more secure and lightweight encryption

algorithm needs to be developed. It needs to have a higher processing speed, smaller key size,

and less power computation. The requirement for lightweight cipher implies that the existing

candidates are not good enough for gate count and area. The process involving algorithm change

is quite expensive, and the impact on performance will be greatly reduced and overall

nonnegligible compared to the application of the scaling technology. Hence though we need new

ciphers, they should bring with them new perspectives regarding properties and designs

techniques.
LIGHTWEIGHT CRYPTOGRAPHY

Reference

1. Andreeva, E., Bilgin, B., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., &
Yasuda, K. (2014, March). APE: authenticated permutation-based encryption for
lightweight cryptography. In International Workshop on Fast Software
Encryption (pp. 168-186). Springer, Berlin, Heidelberg.

2. Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., & Wingers, L.
(2015, June). The SIMON and SPECK lightweight block ciphers. In Design
Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE (pp. 1-6). IEEE.

3. Gupta, K. C., & Ray, I. G. (2013, September). On constructions of MDS matrices


from companion matrices for lightweight cryptography. In International
Conference on Availability, Reliability, and Security (pp. 29-43). Springer, Berlin,
Heidelberg.

4. Maimut, D., & Ouafi, K. (2012). Lightweight cryptography for RFID tags. IEEE
Security & Privacy, 10(2), 76-79.

5. Manifavas, C., Hatzivasilis, G., Fysarakis, K., & Rantos, K. (2014). Lightweight
cryptography for embedded systems–A comparative analysis. In Data Privacy
Management and Autonomous Spontaneous Security (pp. 333-349). Springer,
Berlin, Heidelberg.

6. Matsuda, S., & Moriai, S. (2012, September). Lightweight cryptography for the
cloud: exploit the power of bitslice implementation. In International Workshop
on Cryptographic Hardware and Embedded Systems (pp. 408-425). Springer,
Berlin, Heidelberg.

7. McKay, K. A., McKay, K. A., Bassham, L., Turan, M. S., & Mouha, N.
(2017). Report on lightweight cryptography. US Department of Commerce,
National Institute of Standards and Technology.

8. Shemaili, M. B., Yeun, C. Y., Mubarak, K., & Zemerly, M. J. (2012, December).
A new lightweight hybrid cryptographic algorithm for the internet of things.
In Internet Technology And Secured Transactions, 2012 International Conference
for (pp. 87-92). IEEE.

You might also like