Lightweight Encryption Algorithms PDF Task 1
Lightweight Encryption Algorithms PDF Task 1
Group Members:
Name: Rajan Niranjan
Roll no: 2022PGCSCA099
Name: Mayur Shengal
Roll no: 2022PGCSCA100
Name: Anshul Parihar
Roll no: 2022PGCSCA101
2.1 PRESENT
Overview: PRESENT is a block cipher with a block size of 64 bits and key sizes of 80 or
128 bits, designed to be highly efficient in hardware implementations.
Strengths: Low power consumption and small footprint make it ideal for RFID tags and
sensor networks.
Weaknesses: Vulnerable to side-channel attacks and lacks the robustness of more
complex algorithms.
Use Cases in IoT: Used in smart cards and RFID systems due to its lightweight nature.
2.2 SPECK
2.3 SIMON
2.5 LEA
Overview: LEA is a lightweight block cipher designed for efficiency in both hardware and
software. It uses a 128-bit block size and supports key sizes of 128, 192, and 256 bits.
Strengths: High speed, low energy consumption, and versatile implementation in
various environments.
Weaknesses: Relatively new and less studied compared to older algorithms.
Use Cases in IoT: Applicable in systems requiring high-speed encryption, such as IoT-
based real-time data processing.
2.6 HIGHT
Overview: HIGHT is a lightweight block cipher with a 64-bit block size and 128-bit key
size, designed specifically for low-power devices.
Strengths: Extremely low power consumption and small footprint.
Weaknesses: Limited security margin compared to more advanced ciphers.
Use Cases in IoT: Commonly used in smart cards and low-resource IoT environments
such as RFID systems.
3. Comparative Analysis
The following analysis compares six lightweight encryption algorithms: PRESENT,
SPECK, SIMON, AES-128, LEA, and HIGHT, focusing on their structure, security features,
performance, and applicability in resource-constrained environments like the Internet
of Things (IoT).
4. Conclusion
Lightweight encryption algorithms are critical in ensuring the security of IoT systems,
where resources such as memory, processing power, and energy are constrained.
Algorithms like PRESENT and HIGHT are more suitable for low-power devices, while
AES-128 and LEA are better for more resource-rich environments. Each algorithm has
trade-offs between security, performance, and resource consumption, making it
essential to choose the right one based on the IoT application.
5. References
• Bogdanov, A., et al. (2007). PRESENT: An Ultra-Lightweight Block Cipher.
• Beaulieu, R., et al. (2013). The SIMON and SPECK Block Ciphers.
• National Institute of Standards and Technology (NIST). (2001). Advanced
Encryption Standard (AES).
• Hong, S., et al. (2006). HIGHT: A New Block Cipher Suitable for Low-Resource
Devices.
• Lee, H., et al. (2013). LEA: A Lightweight Block Cipher for Fast Encryption.