0% found this document useful (0 votes)
26 views

Lightweight Encryption Algorithms PDF Task 1

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Lightweight Encryption Algorithms PDF Task 1

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Lightweight Encryption Algorithms

Group Members:
Name: Rajan Niranjan
Roll no: 2022PGCSCA099
Name: Mayur Shengal
Roll no: 2022PGCSCA100
Name: Anshul Parihar
Roll no: 2022PGCSCA101

Supervisor’s Name: Dr. Sanjay Kumar


Date of Submission: 3rd October 2024
1. Introduction
2. Algorithm Analysis
• 2.1 PRESENT
• 2.2 SPECK
• 2.3 SIMON
• 2.4 AES-128
• 2.5 LEA
• 2.6 HIGHT
3. Comparative Analysis
4. Conclusion
5. References
1. Introduction of Lightweight encryption algorithms

Lightweight encryption algorithms are specifically designed to provide secure data


protection in environments with limited computational resources, such as Internet of
Things (IoT) devices. The primary objective of these algorithms is to maintain a balance
between strong security measures and the low resource consumption required by small
devices with constrained power and processing capabilities. As the IoT ecosystem
expands, ensuring data security in applications ranging from smart homes to industrial
automation has become paramount, making lightweight encryption a critical area of
study.
Importance in IoT
1. Resource Constraints: IoT devices often operate on batteries and have limited
processing power and memory. Lightweight encryption algorithms are optimized
for efficiency, allowing these devices to secure data without depleting resources
rapidly.
2. Scalability: As the number of IoT devices increases, scalable encryption
solutions are necessary. Lightweight algorithms enable mass deployment of
secure devices, ensuring that as many devices as possible can participate in the
IoT ecosystem without compromising security.
3. Security Needs: With the rise in cyber threats, ensuring the confidentiality,
integrity, and authenticity of data transmitted between devices is essential.
Lightweight encryption provides necessary security features while maintaining
operational efficiency.
4. Diversity of Applications: Lightweight encryption algorithms can be applied
across various IoT domains, including healthcare, smart cities, industrial control
systems, and more. Each application may have unique security requirements
that lightweight algorithms can address effectively. In this report, we review
several lightweight algorithms, including PRESENT, SPECK, SIMON, AES-128,
LEA, and HIGHT, to analyse their applicability in IoT systems.
2. Algorithm Analysis

2.1 PRESENT

Overview: PRESENT is a block cipher with a block size of 64 bits and key sizes of 80 or
128 bits, designed to be highly efficient in hardware implementations.
Strengths: Low power consumption and small footprint make it ideal for RFID tags and
sensor networks.
Weaknesses: Vulnerable to side-channel attacks and lacks the robustness of more
complex algorithms.
Use Cases in IoT: Used in smart cards and RFID systems due to its lightweight nature.

2.2 SPECK

Overview: SPECK is a family of lightweight block ciphers with flexible parameters,


allowing various block and key sizes, from 32/64 bits to 128/256 bits.
Strengths: High flexibility, low memory usage, and fast encryption speed make SPECK
suitable for software-based IoT applications.
Weaknesses: Cryptanalysis reveals potential vulnerabilities, and it faces criticism for
lower security margins compared to standard algorithms.
Use Cases in IoT: Suitable for constrained devices like wearables and sensors in
healthcare IoT systems.

2.3 SIMON

Overview: SIMON is a hardware-efficient block cipher family, similar to SPECK but


optimized for hardware environments with block sizes from 32 to 128 bits.
Strengths: Extremely efficient in hardware and offers robust security features.
Weaknesses: Slower in software environments and prone to specific attacks in higher-
order implementations.
Use Cases in IoT: Often used in security for IoT-based embedded systems such as
industrial sensors.
2.4 AES-128

Overview: AES-128 (Advanced Encryption Standard) is a widely used algorithm with a


128-bit key and a 128-bit block size. It offers strong encryption but can be resource-
intensive for IoT devices.
Strengths: High security and widespread adoption in various industries.
Weaknesses: Requires more memory and power, which is a limitation for ultra-low-
power IoT devices.
Use Cases in IoT: Used in secure communication for more resource-rich IoT systems
such as smart homes and automotive IoT.

2.5 LEA

Overview: LEA is a lightweight block cipher designed for efficiency in both hardware and
software. It uses a 128-bit block size and supports key sizes of 128, 192, and 256 bits.
Strengths: High speed, low energy consumption, and versatile implementation in
various environments.
Weaknesses: Relatively new and less studied compared to older algorithms.
Use Cases in IoT: Applicable in systems requiring high-speed encryption, such as IoT-
based real-time data processing.

2.6 HIGHT

Overview: HIGHT is a lightweight block cipher with a 64-bit block size and 128-bit key
size, designed specifically for low-power devices.
Strengths: Extremely low power consumption and small footprint.
Weaknesses: Limited security margin compared to more advanced ciphers.
Use Cases in IoT: Commonly used in smart cards and low-resource IoT environments
such as RFID systems.
3. Comparative Analysis
The following analysis compares six lightweight encryption algorithms: PRESENT,
SPECK, SIMON, AES-128, LEA, and HIGHT, focusing on their structure, security features,
performance, and applicability in resource-constrained environments like the Internet
of Things (IoT).
4. Conclusion
Lightweight encryption algorithms are critical in ensuring the security of IoT systems,
where resources such as memory, processing power, and energy are constrained.
Algorithms like PRESENT and HIGHT are more suitable for low-power devices, while
AES-128 and LEA are better for more resource-rich environments. Each algorithm has
trade-offs between security, performance, and resource consumption, making it
essential to choose the right one based on the IoT application.

5. References
• Bogdanov, A., et al. (2007). PRESENT: An Ultra-Lightweight Block Cipher.
• Beaulieu, R., et al. (2013). The SIMON and SPECK Block Ciphers.
• National Institute of Standards and Technology (NIST). (2001). Advanced
Encryption Standard (AES).
• Hong, S., et al. (2006). HIGHT: A New Block Cipher Suitable for Low-Resource
Devices.
• Lee, H., et al. (2013). LEA: A Lightweight Block Cipher for Fast Encryption.

You might also like