0% found this document useful (0 votes)
29 views8 pages

Paper 48-Development of A New Lightweight Encryption Algorithm

This document presents a new lightweight block cipher encryption algorithm called ISL-LWS that is designed for security on resource-constrained devices. The algorithm uses a Feistel network structure with substitution-permutation transformations that include both linear and non-linear transformations via S-boxes to increase diffusion and confusion in fewer rounds. Statistical testing of ciphertext produced by the algorithm was performed according to NIST and Knuth tests and it was found to meet security requirements. The algorithm was also tested for speed on an Arduino board and was found to be faster than the Present and Speck ciphers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views8 pages

Paper 48-Development of A New Lightweight Encryption Algorithm

This document presents a new lightweight block cipher encryption algorithm called ISL-LWS that is designed for security on resource-constrained devices. The algorithm uses a Feistel network structure with substitution-permutation transformations that include both linear and non-linear transformations via S-boxes to increase diffusion and confusion in fewer rounds. Statistical testing of ciphertext produced by the algorithm was performed according to NIST and Knuth tests and it was found to meet security requirements. The algorithm was also tested for speed on an Arduino board and was found to be faster than the Present and Speck ciphers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 14, No. 5, 2023

Development of a New Lightweight Encryption


Algorithm
Ardabek Khompysh1, Nursulu Kapalova2, Oleg Lizunov3*, Dilmukhanbet Dyusenbayev4, Kairat Sakan5
Information Security Laboratory, Institute of Information and Computational Technologies, Almaty, Kazakhstan1, 2, 3, 4, 5
Department of Information Technology, Al-Farabi Kazakh National University, Almaty, Kazakhstan1, 5

Abstract—Due to the growing need to use devices with low When building lightweight block encryption algorithms,
hardware resources in everyday life, the likelihood of their the following architectural solutions are used [7]:
susceptibility to various cyber-attacks increases. In this regard,
one of the methods to ensure the security of information  Reduction of the block size from 128 bits to 64 bits;
circulating in these devices is encryption. For devices with small
 Use of keys 64, 80, and 128 bits long;
hardware resources, the most applicable is low-resource
(lightweight) cryptography. This article introduces a new  Use of 4-bit S-boxes instead of 8-bit ones;
lightweight encryption algorithm, ISL-LWS (Information
Security Laboratory – lightweight system), designed to protect  Use of a simplified key schedule.
data on resource-constrained devices. The encryption algorithm
is implemented in the C++ programming language. The paper
Designing algorithms based on well-studied and widely
presents the statistical properties of ciphertexts obtained using used operations that perform elementary linear/nonlinear
the developed algorithm. For the experimental testing for transformations.
statistical security, the sets of statistical tests by NIST and D. When creating lightweight block ciphers, the following
Knuth were used. Separately, the ISL-LWS algorithm was tested structures are used [8]:
for avalanche effect properties. The obtained results of statistical
tests were compared with the Present and Speck modern  Feistel network;
lightweight algorithms. The study and comparative analysis of
the speed of encryption and key generation of the three  Substitution-permutation network (SP-network) using
algorithms were carried out on the Arduino Uno R3 board. substitution boxes of small length;

Keywords—Lightweight block cipher; S-box; linear


 LRX-structure (logical operations, rotate left (right)
transformation; avalanche effect; IoT devices; RFID tags; null shift, and addition modulo 2);
hypothesis; NIST tests; D. knuth tests  ARX-structure (addition modulo , rotate left (right)
I. INTRODUCTION shift, and addition modulo 2).

The main directions of the development of cryptography One of the main issues in lightweight cryptography is
are largely associated with the development of communications achieving a balance between security, efficiency, and cost.
and information technology. It is the progress in these areas Obviously, optimizing a lightweight cipher to achieve high
that has made possible the widespread use of compact devices speed can weaken some of its security properties, and the
with low computing power that have access to the Internet and algorithm will be more vulnerable to some attacks. Therefore,
implement the concept of the Internet of Things (IoT) [1][2]. when developing a lightweight cipher, the first step is to
Examples of such devices are radio frequency tags (RFID), determine the requirements for its security and limited
automated process control systems (SCADA), wireless sensors, resources, taking into account the scope of its application.
electronic personal identification tools, etc. [3]. When developing the encryption algorithm, the authors tried to
balance security and speed.
Lightweight ciphers are often less secure than traditional
ciphers such as AES. This is because lightweight ciphers are This article presents a new lightweight symmetric block
optimized for high speed and low power consumption, not cipher algorithm ISL-LWS and its statistical analysis. The
maximum security. scientific novelty of the proposed algorithm is the SP
transformation, which is performed in parallel by linear (P-
As defined by the US National Institute of Standards and box) and non-linear (S-box) cryptographic primitives, where
Technology (NIST), lightweight cryptography is a sub- two S-boxes are used simultaneously. This procedure makes it
category of cryptography that aims to provide solutions for possible to increase the degree of non-linearity and data
high-growth applications that make extensive use of low-power confusion in fewer rounds. An overview of related work is
smart devices [4][5]. Modern cryptographic algorithms can presented in the next Section II. Section III presents the
work well on computers, servers, and some mobile phones, but developed algorithm, which is designed according to the
IoT devices, smart cards, and RFID tags require the use of Feistel network and includes linear and non-linear
lightweight cryptographic algorithms [6]. transformations that provide a high level of diffusion and
confusion. The round key schedule algorithm is also presented

452 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 5, 2023

here. The results and discussion of the statistical tests are III. LIGHTWEIGHT ENCRYPTION ALGORITHM ISL-LWC
presented in Section IV. In addition, this section describes data The block diagram of the proposed ISL-LWC lightweight
on the hardware-software implementation of the algorithm and block encryption algorithm is shown in Fig. 1.
comparative performance analysis. Section V presents the
conclusion, where the results of the work are indicated. The main parameters of the algorithm:
II. RELATED WORK  block length – 64 bits;
To date, a fairly large number of lightweight block  key length – 80 bits;
encryption algorithms based on SP networks and Feistel
networks are known [9]. Both approaches have their  number of encryption rounds - 16.
advantages and disadvantages in the context of constructing The algorithm uses SP transformation, modulo 2 addition
algorithms in conditions of limited resources. Lightweight (XOR operation), rotate shift, and non-linear transformations in
block ciphers are represented by the following algorithms: the form of S-boxes (S).
Present [10][11], Clefia [12], Katan [13], Simon [14], Speck
[15], Secure IoT (SIT) [16], etc.
A study by Xinxin Fan et al. (Fan et al. 2013) introduced a
lightweight WG-8 encryption algorithm of the Welch-Gong
family of stream ciphers, adapted for devices with low
hardware resources [17]. Typically, some of them have been
improved and developed by simplifying block ciphers to
improve their performance. For example, DESL which is also
known as lightweight DES, is a variant of classic DES. The
main difference between the DESL cipher and the DES
algorithm is that the former uses one S-box instead of eight
ones, which reduces the ROM requirements for storing tables
by eight times.
The lightweight encryption algorithm Present [18] is
described in the article by L.K. Babenko, D.A. Bespalov, O.B.
Makarevich, R.D. Chesnokov, and Ya.A. Trubnikov. The
authors of this article have developed a software
implementation and synthesized it into a hardware unit for a
system on a chip within the framework of the requirements for
low-resource cryptography, having obtained a sufficiently
effective solution for its application in devices. In 2012, the Fig. 1 Scheme of the encryption algorithm.
ISO and IEC organizations included the Present algorithm in
the international standard for lightweight encryption ISO/IEC The encryption process consists of 4 stages:
29192-2:2012.
Stage 1. A 64-bit plaintext block is added to the round key
Speck is a block lightweight encryption algorithm modulo 2 (XOR operation). Next, the resulting 64-bit block is
developed by the US National Security Agency. Speck is one divided into 4 subblocks of 16 bits each (the subblocks are
of the fastest in lightweight cipher benchmarks, but its numbered from left to right).
performance is highly dependent on architecture. Speck
Stage 2. The 1st input subblock is rotated by 5, then the
supports several block and key sizes. The block length can be
obtained value of the 1st input block is summed (XOR
32, 48, 64, 96, and 128 bits. The key length depends on the
operation) with the 2nd subblock, and the resulting values are
block size. The range of key sizes is 64, 72, 96, 128, 144, 192,
swapped in accordance with the scheme and go through SP
and 256 bits. The number of encryption rounds depends on the
transformations.
block size and the key. The range of rounds is 22, 23, 26, 27,
28, 29, 32, 33, and 34. Speck is standardized by ISO within the Stage 3. The 3rd and 4th sub-blocks go through the
RFID air interface standard [15]. transformation S and then are added (XOR operation) with the
results obtained at Stage 2 according to the scheme.
In a study by Muhammad Usman et al. 64-bit block
lightweight encryption algorithm SIT [16] with a key length of Stage 4. The results of Stages 2 and 3 are swapped
64 bits is considered. The architecture of the algorithm is a according to the scheme of the encryption algorithm.
mixture of a Feistel network and an SP network. Conducted
studies show that the algorithm provides significant security 1) SP transformation: The SP transformation (Fig. 2)
after five rounds of encryption. consists of non-linear 4-bit substitutions S-box1 and S-box2
(Tables I, II) and a linear bit permutation P-box (Table III).
Thus, R&D on the development and study of lightweight The methods for obtaining S-box1 and S-box2 are shown in
encryption algorithms is relevant.
[19]. The transformations above make it possible to perform
confusion and diffusion.

453 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 5, 2023

Fig. 2 SP transformation scheme.

TABLE I S-BOX1 SUBSTITUTION


Fig. 4 Algorithm for generating round keys.
0 1 2 3 4 5 6 7 8 9 A B C D E F
2 E D 6 8 A B 1 5 3 4 9 0 F 7 C IV. STATISTICAL ANALYSIS OF CIPHERTEXTS
One of the main ways to test a block encryption algorithm
TABLE II S-BOX2 SUBSTITUTION for security is to conduct statistical analysis since most
cryptographic attacks are based on the search for statistical
0 1 2 3 4 5 6 7 8 9 A B C D E F vulnerabilities in the ciphertext.
F 5 D 8 C 2 4 7 0 9 6 A 1 3 E B To test sequences for randomness, there are a large number
of algorithms, and for the convenience of checking sequences,
TABLE III P-BOX BIT PERMUTATION software products have already been implemented that contain
some sets of tests. Among them, the most common are the tests
i 0 1 2 3 proposed by NIST, DIEHARD, CRYPT-X, D. Knuth, and
P(i) 3 2 0 1 others [20].
For statistical analysis of ciphertexts obtained using the
2) S transformation; Input 16 bits are represented as ISL-LWC, Present, and Speck encryption algorithms, the NIST
of which every and D. Knuth test sets were used.
sequential 4 bits are represented as ̅̅̅̅
, , , 1) NIST statistical tests: NIST has developed a number of
. The values and are passed statistical tests which are based on the task of calculating a
through 4-bit S-box1 and S-box2 and then swapped according statistic that characterizes a certain property of a sequence
to Fig. 3. compared with a reference statistic. Reference statistics are
obtained mathematically, which is the subject of many
theorems and scientific papers on cryptography, probability
theory, and number theory. NIST tests have already been used
to study the output sequences of cryptographic systems [21].
The tests are based on the concept of the null hypothesis. The
null hypothesis is the assumption that there is some
relationship between the occurrence of numbers. In other
words, the null hypothesis is the assumption that the sequence
Fig. 3 S-box transformation process. is truly random (the symbols of which appear equally likely
and independently of each other). Therefore, if such a
Round subkeys are generated on the basis of an 80-bit base
hypothesis is true, then the encryption algorithm will perform
key, which is divided into five sub-blocks of 16 bits each (sub-
blocks are numbered from left to right) (Fig. 4). The well statistically.
cryptographic transformations used are the 4-bit S-box and To obtain the results of testing ciphers 15 NIST statistical
addition modulo 2 raised to the power of the word length. tests were used: frequency bit test, frequency block test, test for
a sequence of identical bits, test for the longest sequence of
ones in a block, test for binary matrix ranks, spectral test, test
for matching non-overlapping patterns, overlapping pattern
matching test, Maurer's universal statistical test, linear
complexity test, periodicity test, approximate entropy test,
cumulative sums test, arbitrary variance test, and another
arbitrary variance test [22].

454 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 5, 2023

Fig. 5 Comparative analysis of successfully passed NIST tests.

To study the statistical security of the ISL-LWC, Present, 2) Statistical tests by D. Knuth: One of the first sets of
and Speck encryption algorithms using NIST tests, each statistical tests was proposed by D. Knuth in 1969 and
algorithm encrypted 20 files, differing in size, on five different described in his classic work "The Art of Computer
keys. As a result, 100 files were encrypted with each algorithm. Programming". D. Knuth's set contains such tests as the serial
The number of successfully passed NIST tests and a
test, gap test, poker test, coupon collector test, permutation test,
comparative analysis of the ISL-LWC, Present, and Speck
encryption algorithms are shown in Fig. 5. monotonicity test, and correlation test. The tests are based on
the chi-square ( ) statistical test. The calculated value of the
In each test, a so-called P-value is calculated, which statistic is compared with the tabular results and, depending
indicates the level of randomness. If the P-value = 1, then the on the probability of occurrence of such a statistic, a
sequence is perfectly random, and if it is zero, then the conclusion is made about its quality [23]. Among the
sequence is completely predictable. Next, the P-value is
advantages of these tests are their small number and the
compared with the threshold level of randomness α, and if it is
greater than α, then the null hypothesis is accepted and the existence of fast execution algorithms. The disadvantage is the
sequence is recognized as random, otherwise, it is recognized uncertainty in the interpretation of the results [24].
as non-random. To study the statistical security of the ISL-LWC, Present,
In the tests, α = 0.01 is assumed. Therefore: and Speck encryption algorithms using the D. Knuth tests, we
encrypted with each algorithm the same 100 files that were
 If the P-value ≥ 0.01, then the sequence is considered checked using the NIST tests. The number of successfully
random with a confidence level of 99%; passed the tests by D. Knuth and a comparative analysis of the
ISL-LWC, Present, and Speck encryption algorithms are
 If the P-value < 0.01, then the sequence is considered
shown in Fig. 6.
non-random with a confidence level of 99%.
As a result of the study on the tests of D. Knuth and a
As a result of the study and comparative analysis of the
comparative analysis of the three encryption algorithms, it was
three encryption algorithms according to NIST tests, it was
found that the percentage of successfully passed tests by the
found that the percentage of successfully passed tests by
algorithms is 93.5% for ISL-LWC, 99% for Present, and 99%
algorithms is: ISL-LWC – 99%, Present – 97.5%, Speck –
for Speck. From the obtained results, we can conclude that the
97%. From the obtained results, we can conclude that the ISL-
ISL-LWC algorithm satisfies the statistical security criteria.
LWC algorithm satisfies the statistical security criteria.

455 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 5, 2023

Rou
nd
num
ber
042 658 350 54 582

9 14.7 16.6 15.7 30.58 33.2 31.9017 1 0.9905 0.9176


902 519 211 53 181
10 15.1 17.0 16.1 30.61 33.2 31.9265 1 0.9902 0.9218
740 357 049 01 429
11 15.4 17.3 16.4 30.67 33.3 31.9909 1 0.9911 0.9196
715 332 024 45 073
12 15.1 17.0 16.1 30.73 33.3 32.0485 1 0.9926 0.9216
822 439 131 21 649
13 14.9 16.8 15.8 30.66 33.2 31.9782 1 0.9903 0.9211
554 170 862 18 946
14 15.0 16.9 15.9 30.59 33.2 31.8839 1 0.989086 0.9199
505 122 813 75 003
15 14.6 16.4 15.5 30.62 33.2 31.9425 1 0.9898 0.9224
191 812 504 61 589
Fig. 6 Comparative analysis of successfully passed tests by D. Knuth. 16 14.8 16.7 15.8 30.64 33.2 31.9631 1 0.9893 0.9201
984 601 292 67 795
3) Study of statistical security indicators: For the study of ISL-LWC (1000 blocks)
statistical security, the following indicators were considered:
1 9,00 10,8 9,93 3,074 5,70
4,3913 0,1250 0,1372 0,0867
 average number of output bits that change when one 20 637 29 9 77
2 50,6 52,5 51,6 11,3 13,9 12,6 0,46 0,39 0,33
input bit changes (avalanche effect); 934 551 243 027 355 191 83 43 14
 degree of completeness ( ); 3 64,6 66,5 65,6 20,8 23,4 22,1 0,85 0,69 0,63
894 511 202 174 502 338 94 17 45
 degree of avalanche effect ( ); 4 43,9 45,8 44,8 27,3 29,9 28,6 0,98 0,89 0,83
610 227 918 195 523 359 44 40 51
 degree of strict avalanche criterion ( ). 5 20,9 22,8 21,8 30,1 32,7 31,4
1
0,97 0,91
660 277 968 477 805 641 77 15
They are considered for various numbers of cycles and 6 15,5 17,4 16,4 30,5 33,2 31,8 1 0,98 0,91
randomly taken encryption keys. The definition of the above 451 068 759 797 125 961 99 95
indicators is presented in [25]. 7 14,8 16,7 15,7 30,7 33,3 32,0 1 0,98 0,92
609 225 917 411 739 575 88 19
The essence of the experiment is to evaluate the depth of 8 14,4 16,2 15,3 30,6 33,2 31,9 1 0,98 0,92
the avalanche effect of the ISL-LWC encryption algorithm, 042 659 351 255 583 419 95 04
which is determined by the number of encryption rounds. The 9 14,7 16,6 15,7 30,5 33,2 31,9 1 0,99 0,91
903 520 211 853 181 017 06 77
experiment was carried out on 100, 1000, and 10,000 blocks of
10 15,1 17,0 16,1 30,6 33,2 31,9 1 0,99 0,92
ciphertext obtained using the ISL-LWC algorithm. Table IV 741 358 049 102 430 266 02 18
presents the results of the assessment of the statistical security 11 15,4 17,3 16,4 30,6 33,3 31,9 1 0,99 0,91
indicators of the ISL-LWC cipher. 716 333 024 745 073 909 11 97
12 15,1 17,0 16,1 30,7 33,3 32,0 1 0,99 0,92
TABLE IV RESULTS OF THE ASSESSMENT OF STATISTICAL SECURITY 823 439 131 322 650 486 27 17
INDICATORS OF THE ISL-LWC CIPHER 13 14,9 16,8 15,8 30,6 33,2 31,9 1 0,99 0,92
554 171 862 619 947 783 04 12
Rou 14 15,0 16,9 15,9 30,5 33,2 31,8 1 0,98 0,92
nd 505 122 814 975 003 839 91 00
num
15 14,6 16,4 15,5 30,6 33,2 31,9 1 0,98 0,92
ber
191 813 504 261 589 425 99 25
ISL-LWC (100 blocks) 16 14,8 16,7 15,8 30,6 33,2 31,9 1 0,98 0,92
1 9.00 10.8 9.93 3.074 5.70 4.3912 0.125 0.1372 0.0867 984 601 293 467 795 631 94 02
20 636 28 85 76 ISL-LWC (10000 blocks)
2 50.6 52.5 51.6 11.30 13.9 12.61906 0.4682 0.3943 0.3314
1 9,00 10,8 9,93 3,07 5,70 4,39 0,12 0,13 0,08
934 550 242 266 354
20 637 29 49 77 13 50 72 67
3 64.6 66.5 65.6 20.81 23.4 22.1337 0.8593 0.6916 0.6345
2 50,6 52,5 51,6 11,3 13,9 12,6 0,46 0,39 0,33
894 510 202 73 501
934 551 243 027 355 191 83 43 14
4 43.9 45.8 44.8 27.31 29.9 28.6359 0.9843 0.8939 0.8350
3 64,6 66,5 65,6 20,8 23,4 22,1 0,85 0,69 0,63
609 226 918 95 523
894 511 202 174 502 338 94 17 45
5 20.9 22.8 21.8 30.14 32.7 31.4640 1 0.9776 0.9114
4 43,9 45,8 44,8 27,3 29,9 28,6 0,98 0,89 0,83
659 276 968 76 804
610 227 918 195 523 359 44 40 51
6 15.5 17.4 16.4 30.57 33.2 31.8960 1 0.9898 0.9194
5 20,9 22,8 21,8 30,1 32,7 31,4 1 0,97 0,91
450 067 759 96 124
660 277 968 477 805 641 77 15
7 14.8 16.7 15.7 30.74 33.3 32.0575 1 0.9887 0.9219
6 15,5 17,4 16,4 30,5 33,2 31,8 1 0,98 0,91
608 225 916 11 739
451 068 759 797 125 961 99 95
8 14.4 16.2 15.3 30.62 33.2 31.9418 1 0.9894 0.9203

456 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 5, 2023

Rou
nd
num
ber
7 14,8 16,7 15,7 30,7 33,3 32,0 1 0,98 0,92
609 225 917 411 739 575 88 19
8 14,4 16,2 15,3 30,6 33,2 31,9 1 0,98 0,92
042 659 351 255 583 419 95 04
9 14,7 16,6 15,7 30,5 33,2 31,9 1 0,99 0,91
903 520 211 853 181 017 06 77
10 15,1 17,0 16,1 30,6 33,2 31,9 1 0,99 0,92
741 358 049 102 430 266 02 18
11 15,4 17,3 16,4 30,6 33,3 31,9 1 0,99 0,91
716 333 024 745 073 909 11 97
12 15,1 17,0 16,1 30,7 33,3 32,0 1 0,99 0,92 Fig. 7 Arduino Uno R3 board.
823 439 131 322 650 486 27 17
13 14,9 16,8 15,8 30,6 33,2 31,9 1 0,99 0,92 In [25] Arduino IDE version 2.0.0-rc3 was used to compile
554 171 862 619 947 783 04 12 and upload the source code of lightweight encryption
14 15,0 16,9 15,9 30,5 33,2 31,8 1 0,98 0,92 algorithms to the Arduino Uno R3 board (Fig. 8).
505 122 814 975 003 839 91 00
15 14,6 16,4 15,5 30,6 33,2 31,9 1 0,98 0,92
191 813 504 261 589 425 99 25
16 14,8 16,7 15,8 30,6 33,2 31,9 1 0,98 0,92
984 601 293 467 795 631 94 02

In Table IV, the following designations are used:


 is the minimum value of the mathematical
expectation of the number of changed bits for some bit
at the input;
 is the maximum value of the mathematical
expectation of the number of changed bits for some bit
at the input;
 and are the variances of the number of
changed bits in the bitwise estimation of the minima Fig. 8 Arduino IDE.
and maxima of the mean values;
is the average number of changed bits: The three encryption algorithms (Speck, Present, and ISL-
LWC) were implemented by the staff of the Information
(1) Security Laboratory of the Institute of Information and
Computational Technologies of the Committee of Science of
Analyzing the data obtained in Table IV, we can conclude the Ministry of Science and Higher Education of the Republic
that with an increase in the number of blocks for encryption, of Kazakhstan (RK MSHE CS IICT ISL) in the high-level
more accurate values of and , are obtained, i.e. they programming language С++.
approach value 1 faster in the fourth and subsequent rounds. As
The tests were carried out on open-source software
a result of the study, it was found that at the 4th round of
platforms developed by the US National Institute of Standards
encryption of the ISL-LWC algorithm, the input sequence is
and Technology in order to unify, simplify, and speed up the
completely confused.
testing of lightweight cryptographic algorithms.
Results of the study and comparative analysis of the time of
The results of the study and comparative analysis
encryption and key generation on the Arduino Uno R3 board.
of the Present, Speck, and ISL-LWC algorithms are shown in
Encryption time testing for three encryption algorithms Table V.
Speck, Present, and ISL-LWC was carried out on the Arduino
Uno R3 board (Fig. 7). TABLE V COMPARATIVE ANALYSIS OF THE ALGORITHMS BY THE TIME
OF ENCRYPTION AND KEY GENERATION
 main features of Arduino Uno R3;
Encryption Key size, Plaintext block Encryption Key setting
 microcontroller - ATmega328; algorithm bits size, bits time, µs time, µs
80
 clock frequency - 16 MHz; Present 2111.56 1541.31

 operating voltage - 5 V; Speck 96 64 16.90 1320.69

 flash memory - 32 MB; ISL-LWC 80 108.59 275.12

 RAM - 2 Kb.

457 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 5, 2023

As a result of a comparative analysis of Table V, it was [5] T. Eisenbarth, and S. Kumar, “A Survey of Lightweight-Cryptography
found that the proposed encryption algorithm works faster than Implementations,” IEEE Des Test Com., vol. 24, no. 6, pp. 522–533,
2007.
Present, and when scheduling round keys, it is 6 and 5 times
[6] I. Bhardwaj, A. Kumar, and M. Bansal, “A review on lightweight
faster than the algorithms under consideration, respectively. cryptography algorithms for data security and authentication in IoTs,
“ 2017 4th Int. Conf. on Sig. Proc., Com. and Cont., (ISPCC), India, pp.
V. CONCLUSION 504-509, 2017, doi: 10.1109/ISPCC.2017.8269731.
Lightweight encryption algorithms are considered a [7] A. E. Zhukov, “Lightweight Cryptography [Part 1. Cybersecurity
relatively new direction in the development of symmetric Issues],” vol. 1, no. 9, pp. 26-43, 2015.A. S. Soskov, and B. Ya. Ryabko,
“The distinguishing attack on ARX-based lightweight block ciphers,”
cryptography. This need arose as a result of the emergence of a Comp. Tech. vol. 24, no. 3, pp. 106–116, 2019. DOI:
large number of devices with little computing power and 10.25743/ICT.2019.24.3.008.
memory. Therefore, there was a need to develop algorithms [8] E. A. Ischukova, and E. A. Tolomanenko, “Analysis of the algorithms
that can provide a sufficient level of security with minimal use for encryption of lightweight cryptography in the context of the Internet
of resources. of Things,” Mod. High Tech., vol. 3, no. 2, pp. 182-186, 2019, URL:
https://top-technologies.ru/ru/article/view?id=37462.
This paper provides a brief literature review of existing [9] Zh. Tang, J. Cui, H. Zhong, and M. Yu, “A Random PRESENT
lightweight encryption algorithms. A new lightweight block Encryption Algorithm Based on Dynamic S-box International,” Jour. of
encryption algorithm ISL-LWC, developed by the staff of the Sec. and Its Appl., vol. 10, no. 3, pp. 383-392, 2016,
RK MSHE CS IICT ISL, is presented. http://dx.doi.org/10.14257/ijsia.2016.10.3.33.
[10] A. Suhail, N. Mir, A. Mehvish, S. Ishfaq, and B. M. Tariq, “FPGA
The cryptographic properties of the developed algorithm were Implementation of PRESENT Block Cypher with Optimised
studied using the evaluation of the "avalanche effect" and Substitution Box,” 2022 Smart Tech., Com. and Robot. STCR, pp. 1-6,
statistical tests. Based on the work carried out, it was found 2022, doi: 10.1109/STCR55312.2022.10009366.
that the proposed encryption algorithm is effective in providing [11] T. Shirai, T. Shibutani, and K. Akishita, “The 128-bit block cipher
CLEFIA,” FSE 2007. LNCS, vol. 4593, pp. 181–195, 2007.
a good avalanche effect, and the encrypted data is close to
random and is statistically safe. [12] F. M. Qatan, and I. W. Damaj, “High-speed KATAN ciphers on-a-chip,”
Comp. sys. and Ind. Inf. ICCSII, 2012 Inter. Conf, IEEE, pp. 1–6, 2012.
The developed algorithm is implemented in software and [13] E. Aysu, and P. Gulcan, “Schaumont. SIMON says: Break area records
hardware on the Arduino Uno R3 board. A study and of block ciphers on FPGAs,” IEEE Emb. Syst Lett, vol. 6, pp. 37–40,
2014, https://doi.org/10.1109/les.2014.2314961.
comparative analysis of the encryption and key generation time
with the well-known lightweight algorithms Present and Speck [14] R. Beaulieu, S. D. Treatman-Clark, B. Shors, J. Weeks, Smith, and L.
Wingers, “The SIMON and SPECK lightweight block ciphers,” 2015
have been carried out. 52nd ACM/EDAC/IEEE Des. Auto. Conf DAC, San Francisco, USA,
2015, pp. 1-6, doi: 10.1145/2744769.2747946.
The obtained test results allow us to conclude that the ISL-
LWC cipher is generally not inferior to these two well-known [15] U. Muhammad, A. Irfan, M. Imran, Kh. Shujaat, and A. Sh. Usman,
“SIT. A Lightweight Encryption Algorithm for Secure Internet of
lightweight algorithms. Further study of the cryptographic Things,” IJACSA Inter. Jour. of Adv. Comp. Sci. and Appl, vol. 8, no. 1,
properties of this algorithm by other methods, such as linear pp. 402-411, 2017.
and differential cryptanalysis, etc., will be continued. The [16] F. Xinxin, M. Kalikinkar, and G. Guang, “WG-8: A Lightweight Stream
results will be presented in subsequent papers and used to Cipher for Resource-Constrained Smart Devices Quality, Reliability,
improve the proposed algorithm. Security and Robustness in Heterogeneous Networks,” vol. 115, pp.
617–632, 2013, https://doi.org/10.1007/978-3-642-37949-9_54.
ACKNOWLEDGMENT [17] A. Bogdanov, L. Knudsen, G. Leander, and et al, “PRESENT: An ultra-
lightweight block cipher,” CHES 2007. LNCS, vol. 4727, pp. 450–466,
The work was performed within the framework of the grant 2007.
funding project AP09259570 “Development and study of a [18] A. Khompysh, N. Kapalova, K. Algazy, D. Dyusenbayev, and K.
domestic lightweight encryption algorithm with limited Sakan, “Design of substitution nodes (S-Boxes) of a block cipher
resources” of the RK MSHE CS. intended for preliminary encryption of confidential information,” Cogent
Engineering, vol. 9, no. 1, pp. 1-14, 2022, DOI:
REFERENCES 10.1080/23311916.2022.2080623.
[19] A. A. Perov, “Using NIST statistical tests for the analysis of the output
[1] V. A. Dovgal, and D. V. Dovgal, “Internet of Things: Concept,
sequences of block ciphers,” Sci. Bull. of NSTU, vol. 3, no. 76, pp. 87–
Applications, and Tasks,” Bulletin of the Adyghe State University,
96, 2019. doi:10.17212/1814-1196-2019-3-87-96.
Series 4: Natural-Mathematical and Technical Sciences, vol. 1, no. 212,
pp. 129-135, 2018. [20] F. Sulak, M. Uğuz, O. Koçak, and A. Doğanaksoy, “On the
independence of statistical randomness tests included in the NIST test
[2] F. Chetouane, “An Overview on RFID Technology Instruction and
suite,” Turk. Jour. of Elec. Engin. & Comp. Scien. vol. 25, no.5, pp.
Application,” IFAC-PapersOnLine, vol. 48, no. 3, pp. 382-387, 2015,
3673-3683, 2017. doi:10.3906/elk-1605-212.
https://doi.org/10.1016/j.ifacol.2015.06.111.
[21] M. O. Pikuza, and S. Yu. Mikhnevich, “Testing a hardware random
[3] H. Hasan, G. Ali, W. Elmedany, and C. Balakrishna, “Lightweight
number generator using NIST statistical test suite,” BSUIR Reports, vol.
Encryption Algorithms for Internet of Things: A Review on Security and
19, no. 4, pp. 37-42, 2021. https://doi.org/10.35596/1729-7648-2021-19-
Performance Aspects,” Int. Con. on Innov. and Intel. for Inf, Com. and
4-37-42.
Tech (3ICT), pp. 239-244, 2022, doi:
10.1109/3ICT56508.2022.9990859. [22] K. Sakan, S. Nyssanbayeva, N. Kapalova, K. Algazy, A. Khompysh,
and D. Dyusenbayev, “Development and analysis of the new hashing
[4] P. K. Dhillon, and S. Kalra, “A lightweight biometrics based remote user
algorithm based on a block cipher,” Easter-Euro. Jour. of Enter.
authentication scheme for IoT services,” Jour. Inf. Sec. and Appl, vol.
Techn, vol. 2, no. 9 (116), pp. 60–73, 2022.
34, pp. 255–270.
https://doi.org/10.15587/1729-4061.2022.252060 2022
[23] N. A. Kapalova, A. Khompysh, А. Müslüm, and K. Algazy, “A block
encryption algorithm based on exponentiation transform [Cogent

458 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 5, 2023

Engineering], 2020, Vol.7, no. 1, pp.1-12, https://doi.org/10.1080/2331 Euro. Jour. of Adv. Tech. ISSN 1729-3774 vol. 6, no.9 (60 ), pp. 1-11,
1916.2020.1788292 2012.
[24] I. V. Lisitskaya, A. A. Nastenko, K. E. Lissitzky, “ Large ciphers - [25] M. Simon, “Programming Arduino: Getting Started with Sketches,”
random substitutions. Comparison of statistical security indicators of Third Edition, McGraw Hill LLC, p.176, 2022.
block symmetric ciphers submitted to the Ukrainian competition,” East.

459 | P a g e
www.ijacsa.thesai.org

You might also like