Lightweight cryptographic algorithms on resource-constrained devices

TX Meng, W Buchanan - 2020 - preprints.org
TX Meng, W Buchanan
2020preprints.org
As the embedded device and internet of things (IoTs) concept prevalent in today's world,
there is an increasing demand for the security and performance requirements on deploying
these devices to private and public sectors. The crucial part of it is to protect privacy,
confidentiality and integrity, meanwhile, maintain an adequate level of performance during
transmission, storage and access of critical information. While the conventional cryptography
methods, such as the Advanced Encryption Standard (AES), SHA $-$2 hashing method and …
Abstract
As the embedded device and internet of things (IoTs) concept prevalent in today's world, there is an increasing demand for the security and performance requirements on deploying these devices to private and public sectors. The crucial part of it is to protect privacy, confidentiality and integrity, meanwhile, maintain an adequate level of performance during transmission, storage and access of critical information. While the conventional cryptography methods, such as the Advanced Encryption Standard (AES), SHA 2 hashing method and RSA and Diffie Hellman for message authentication and identification, work well on systems which have reasonable processing power and memory capabilities. These do not scale well into a world with embedded systems and sensor networks, in conjunction with their nature of smaller size and lower cost. Thus, in the context of resource constrained device, lightweight cryptography methods are proposed to overcome many of the problems of conventional cryptography possessed. This includes constraints related to physical size, processing requirement, memory limitation, energy drain and production cost. This paper provides a survey of the architectures that are defined as replacements for conventional ciphers within an IoTs space and discuss some trends in the design of future lightweight algorithms. The performance metrics are carefully chosen to reflect and assess the suitability for embedded devices. The aim of this research is to identify the various performance metrics applied on different types of symmetric block ciphers especially lightweight ciphers and compare the results on versatile platforms with stream ciphers and public key methods. The comparative analysis on efficient LW cipher will be tested against other similar block ciphers on both MacBook Pro with Intel core and resource constrained device Raspberry Pi with ARM processor.
Preprints.org
以上显示的是最相近的搜索结果。 查看全部搜索结果