5565 IoT
5565 IoT
1
Center of Excellence in Cyber Security and Cryptology, Computer Science & Engineering, Sharda School of Engineering &
Technology, Sharda University, Greater Noida, Uttar Pradesh, India, https://orcid.org/0000-0001-6922-3403
2
Computer Science & Engineering, Sharda School of Engineering & Technology, Sharda University, Greater Noida, Uttar
Pradesh, India, https://orcid.org/0009-0000-1061-9382
3
Computer Science & Engineering, Sharda School of Engineering & Technology, Sharda University, Greater Noida, Uttar
Pradesh, India. https://orcid.org/0000-0003-4674-2213
4
School of Computing Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India.
Abstract
The paper examines the rising significance of security in Internet of Things (IoT) applications and emphasizes the need for
lightweight cryptographic solutions to protect IoT devices. It acknowledges the growing prevalence of IoT in various
fields, where sensors collect data, and computational systems process it for action by actuators. Due to IoT devices'
resource limitations and networked nature, security is a concern. The article compares different lightweight cryptographic
block cipher algorithms to determine the best approach for securing IoT devices. It also discusses the merits of hardware
versus software solutions and explores potential security threats, including intrusion and manipulation. Additionally, the
article outlines future work involving the implementation of the trusted Advanced Standard Encryption block cipher in IoT
devices, including its use in quick-response (QR) code scanning and messaging platforms. It acknowledges existing
drawbacks and suggests areas for improvement in IoT system performance and security.
Keywords: Lightweight Cryptography, Internet of Things (IoT), Cryptography, Block Cipher, Advanced Standard Encryption
(AES)
Received on 14 December 2023, accepted on 20 March 2024, published on 27 March 2024
Copyright © 2024 Amrita et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NC-SA 4.0,
which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the
original work is properly cited.
doi: 10.4108/eetiot.5565
_______________________________________
devices are used in a variety of industries as [7][8] While the significance of security based on
[9][10][11]: cryptography is growing, incorporating various
cryptographic standards and algorithms in an IoT devices
remain challenging due to significant area and power
overhead. Additionally, effective encryption in IoT
necessitates appropriate and efficient encryption key
management processes, as inadequate key management
can jeopardize overall security. IoT devices are inherently
lightweight, implying limited storage space. Moreover, as
IoT devices rely on batteries, minimizing power
consumption is a key consideration.
Conventional ciphers like Advanced Encryption
Standard (AES), Data Encryption Standard (DES), and
RC6 are unsuitable for direct application in IoT domains
due to the heterogeneous, scalable, and dynamic nature of
these devices [13]. To address this, the scientific literature
explores lightweight cryptographic algorithms as potential
solutions. These algorithms aim to mitigate the
computational impact of security measures, striking a
Figure 1. IoT Devices balance between cost and performance to enhance human
security and privacy [14][15][16].
In the review went through different and recent work
(i) Home automation: when multiple IoT devices are
done by researchers in determining best security options
connected in smart homes so that users can handle various
for IoT devices as going through different lightweight
activities such as turning on and off lights and controlling
algorithm comparing them in terms of block ciphers and
the temperature inside the house all from their phone.
mainly approach in Advanced Standard Encryption (AES) for
the IoT solution in terms of its security [17] [18] [19].
(ii) In healthcare: IoT devices have greatly aided the
The following are the sections of the paper:
monitoring of patients, resulting in a higher percentage of
Cryptography background is reviewed in Section 2.
lives saved because doctors can monitor the devices
Section 3 provides the literature survey. In Section 4, it
connected to the patient on their tablets and obtain real-
represents Lightweight Cryptography based AES. Section
time data of the patient, allowing them to be notified
5 and Section 6 represent discussion and conclusion and
immediately if something is wrong.
future research respectively.
(iii) Surveillance has improved as a result of IoT
devices connected to each other via network, making it
2. Cryptography Background
easier to guarantee safety, such as by using cameras and
motion detectors to monitor the movement of someone or
an object being conveyed from one point to another where 2.1. Cryptography
data can be presented in a device such as a smart phone.
Cryptography is the method of encrypting data into cipher
(iv) Natural catastrophes: They have been aided by IoT text for safe transmission, preventing unauthorized users
technology, which have assisted us in preventing from accessing or altering information. Cryptography is
accidents and increasing disasters by assisting in disaster categorized into two types: symmetric cryptography and
prediction. It can now collect data from sensors placed in asymmetric cryptography [12].
various environments, which may assist us in disaster
prediction. 1) Symmetric Cryptography: Symmetric cryptography
is a cypher technology that encrypts and decrypts data
This situation involves critical scenario of collecting sent across a network using the same key Figure 2. It’s
highly sensitive data through IoT devices, often without secure and fast but the problem is sharing the key as when
individuals' awareness. The challenge lies in ensuring it falls in a wrong hand the encrypted data is
private and secure communication to safeguard data compromised [12].
integrity and prevent unauthorized access to individual
information. However, standard devices in IoT
architecture face limitations in computational resources
and power capacity, referred to as resource-constrained
devices. To ensure the protection of data, it is necessary to
employ a method, and this is where cryptography
becomes crucial [12].
used by the DFA assault reduced the necessary processing The HIGHT lightweight method introduced by Hong
time using just two pairs of fault free and defective et al in 2006 was shown to be highly handy for severely
plaintexts. restricted devices such as RFID tags, and it was also
They suggested a new AES mixed S-box/inverse S- found to be quicker than other algorithms such as AES in
box architecture in this study that would be both lighter 8-bit microcontrollers, however it was a generalized
and speedier than Canright's [33]. In terms of physical imbalanced fiestel network [40].
area of device and latency, our unique combination the S- The author produced a variation of DES depending
box's design exceeds the best method known in the on the number of bits they processed, assigning 4bit and
literature, according to our study and ASIC 6bit data rather than 32bit and 48bit data, meaning the
implementation findings. shortest DES implementation but resulting in poor
They updated the Serpent Algorithm in terms of security [41]. The author added XOR gates to the DES to
computing and algebra in order to make it compatible improve security, a process known as key whitening,
with a variety of applications [34]. The change is that it is where one is placed in plaintext before the cipher process
now 31% less complicated and quicker than the previous and the other in the cipher-text result.
method. PRESENT algorithm was induced as block cipher
They designed and implemented a single highly algorithm for the lightweight cryptographic algorithm
beneficial approach for AES area efficiency as well as [42]. The authors explored the algorithm works as a
excellent performance by employing "mixing of column secure algorithm working with 64 bits of block size and
and inverse mixing of column operation," This is among being processed with 80 bits key. The author explained
the most important operational blocks in AES for the blowfish algorithm's execution using FGPA (field
achieving an excellence performance [35]. The results programmable get array), which produces a great result by
show that the suggested mix-column architecture is being easy to implement at a high speed while also
simpler than earlier work when it comes to gate length reducing the amount of time required to encrypt the data,
and clock rotations. resulting in higher throughput, all done in a highly
They created and showed a small architecture for AES integrated circuit description language (VHDL) [45].
mix-columns working as well as its inverse [36]. Previous Introducing a novel algorithm, GFRX, which
work in this area is compared to the hardware amalgamates a generalized Feistel structure with Addition
implementation. They demonstrated that our architecture or AND, Rotation, XOR (ARX). The GFRX algorithm
has fewer gates than existing designs that implement both employs an ARX configuration with diverse non-linear
the forward and inverse mix columns operations. The components to address all branches of a generalized
comparisons show that the suggested mix-column Feistel structure, enhancing diffusion effects in fewer
structures are less difficult than earlier work in this area. rounds. Security analysis results for the GFRX algorithm
They discovered the power used during the encryption indicate that effective differential attacks are contained
cycle process of whatever block cipher with an r-round within 19 rounds, and effective linear attacks do not
unwrapped structure is indeed a quadratic function by exceed 13 rounds. Hence, the GFRX algorithm
researching A CMOS gate's energy consumption model. demonstrates a sufficient security level for both
They then used our approach to forecast the best value of differential and linear analyses. Avalanche test results for
(r) for unrolling an r-round design as it is believed that a GFRX underscore robust diffusion, achieving the
cypher will be the most power efficient [37]. using well- avalanche effect in just six rounds. Moreover, the GFRX
known lightweight block cyphers. They demonstrated that algorithm offers varying levels of serialization based on
the overall power spent during a functioning of encryption distinct hardware resource requirements, including the
is generally proportional to the degree of unrolling. capability of achieving full serialization. This feature
They've submitted a design study for minimal AES ensures operational flexibility in environments with
Data encryption cores for IoT [38]. The theoretical lower resource constraints [46].
bound for the clock rotation count per encryption has been The study introduces LRBC, a novel encryption
investigated, and prior designs have indeed been technique tailored for resource constrained IoT devices,
examined. The advantages of native S-box designs have providing enhanced data security at the sensing level.
indeed been proved and quantified, as well as design LRBC combines the structural benefits of SPN and Feistel
advice for obtaining a desired achievement count. structure for improved security. Experimental validation
The CLEFIA lightweight algorithm created by Sony was conducted using the NEXYS 4 DDR FPGA (Artix-7)
Corporation in 2007, is a block cipher that imposed new trainer kit and implementation on a TSMC 65 nm ASIC
approaches such as digital rights management, which chip. The proposed technique demonstrates low power
improved security against attacks, and it also has a wider
consumption (11.40 μW) and occupies a compact 258.9
range of application in terms of hardware and software
GE area. Security analysis affirms robustness against
capabilities for implementing security [39].
various attacks, ensuring high security. LRBC also
As its goal is to assure hardware economy and
exhibits an average avalanche effect of 55.75% and 58%
security, the current lightweight algorithm is an ultralight
for key and plaintext respectively [47].
cryptography that delivers security of block size of 64bit
The LCB encryption strategy, tailored for IoT devices,
data guarded by a key with 80bit.
enhances security by combining the advantages of the
Feistel structure and the substitution permutation network [45] BLOWFISH 32-448 64 16
architecture. Tested on the (Virtex-7) XC7VX330T FPGA
board, LCB occupies a minimal area of 224 GE and [39] CLEFIA 128,192,256 128 18,22,26
demonstrates high speed with a low combinational path
[41] DES 56 64 16
delay of 0.877 ns. Extensive testing validates its ability to
offer heightened security against cryptographic attacks. [43] DESXL 184 64 48
The Avalanche Effect of LCB is observed at 63.125% and
63.875% for the key and plaintext respectively [48]. [40] HIGHT 128 64 32
This paper presents the development of a resilient and
efficient lightweight cipher tailored for securing the IoT [42] PRESENT 80,128 64 32
environment, specifically designed to accommodate the
resource limitations inherent in IoT devices. Additionally, [50] SIMON 128 128 64
we introduce a lightweight cryptographic algorithm based
[50] SPECK 128 128 32
on symmetric and block ciphers. This algorithm enhances
the intricacy of the block cipher while minimizing
computational demands. It effectively implements a key
register updating method, decreases the number of
encryption rounds, and introduces an additional layer
Table 2. Performance in terms of Throughput
between the encryption and decryption processes. [49].
Another algorithm proposed by where it tries to cover
all the specs in terms of software and hardware were the Ref Algorithm Key Size Technology Throughput
researcher proposed the SIMON algorithm for as a (µM) (KBPS)
lightweight algorithm for implementation of hardware
specification and SPECK to which was introduced for
optimal implementation of the software specification [50]. [44] AES 128 0.13 56.64
In [51], the presentation of four area-optimized S-
boxes is featured, consisting of two 4-bit S-boxes (S1 and [39] CLEFIA 128 O.13 39
S2) and two 8-bit S-boxes (SB1 and SB2). These S-boxes
[40] HIGHT 128 0.25 188.2
are well-suited for the building of lightweight block
ciphers. The outcomes indicate that the suggested [42] PRESENT 128 0.18 12.12
structures exhibit reasonable utilization of hardware
resources, timing characteristics, and security properties [50] SIMON 128 0.13 22.9
when compared to alternative approaches.
A lightweight block cipher called TWINE, consisting [50] SPECK 128 O.13 12.1
of 36 rounds, with a block size of 64 bits and a key size of
80/128 bits is introduced [52]. Meanwhile, a reassessment
of the security of TWINE-80 is conducted by researchers In the Table 3, the researcher tried to compare the
in [27]. Their study focused on impossible differential implementation with AES in which we can see the
cryptanalysis in a related-key model, and they enhanced HIGHT implementation resulted into higher throughput
the conventional impossible differential attack by compared to the AES but rather than that we can’t
introducing an additional round. compare the two technologies as we can’t compare
The Table 1 tries to give abroad visualization on the different implementations with different technology, as
algorithm gone through basing on their characteristic such some may be easier in other harder in the FGPAs [40].
as size of their keys and blocks and rounds required by a
specific key. Also, Table 2 expresses the different Table 3. HIGHT and AES comparison
implementation based to different technology as
expressing with the reference of their amount of
Technology Algorithm Throughput Area
throughput.
Table 1. Comparison between different light-weight 0.25µM HIGHT 150 MBPS 3048
algorithms
0.35µM AES 9.9 MBPS 3400
Table 4. Structure and Remarks of the Algorithms secure than other algorithm to date, as QR encryption will
bring benefits in a large area in IoT as many IoT activities
uses QR to connect with the system [55][56].
Ref Algorithm Structure Remarks
.
6. Conclusion and Future Research In: IEEE 5th World Forum on Internet of Things (WF-
IoT). 2019.
Solutions of lightweight security for the IoT were covered [14] Bhagat, V., Kumar, S., Gupta, S.K., Chaube, M.K.
Lightweight cryptographic algorithms based on different
in our study. The studies based on asymmetric
model architectures: A systematic review and futuristic
cryptographic techniques and symmetric cryptography for applications. Concurrency and Computation Practice and
the IoT (Stream Ciphers algorithm and Block Ciphers Experience. 2023; 35(10): e7425.
algorithm). In terms of design, mix-column and [15] Silva, C., Cunha, V.A., Barraca, J.P. et al. Analysis of the
Substitution-box, and risks, was examined at recent Cryptographic Algorithms in IoT Communications. Inf
research on Advanced Standard Encryption (AES) for IoT. Syst Front. 2023.
As per our findings, lightweight algorithm by AES is an [16] Thakor, V.A., Razzaque, M.A., and Khandaker, M.R.A.
excellent security option for most of constrained IoT Lightweight cryptography algorithms for resource-
devices as have limited resources. constrained IoT devices: A review, comparison and
The AES block cypher is a well and investigated of all research opportunities. IEEE Access. 2021; 9: 28177-
28193.
the block cyphers. Researchers are concentrating on
[17] Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P.,
making AES lighter and more IoT-friendly. Improvement and Sikdar, B. A survey on iot security: Application areas,
on the AES design is our future with the goal of creating a security threats, and solution architectures. IEEE Access.
lightweight IoT ecosystem. 2019; 7: 82721-82743.
[18] Dutta, I. K., Ghosh, B., and Bayoumi, M.A. Lightweight
Cryptography for Internet of Insecure Things : A Survey.
References In: IEEE 9th Annual Computing and Communication
Workshop and Conference (CCWC). 2019. 475-481.
[1] Global IoT and non-IoT connections 2010–2025 (accessed [19] Sadkhan, S. B. and Salman, A. O. A survey on
on 17 august 2023), 2023. lightweight-cryptography status and future challenges. In:
URL https://www.statista.com/statistics/1101442/. International Conference on Advance of Sustainable
[2] Georgiev, D. Internet of Things Statistics, Facts & Engineering and its Application (ICASEA), Wasit - Kut,
Predictions [2023′s Update]. Available Iraq. 2018. 105-108.
online: https://review42.com/resources/internet-of-things- [20] Ammar, M., Russello, G., and Crispo, B. Internet of
stats/ Things: A survey on the security of IoT frameworks.
[3] Ding, J., Nemati, M., Ranaweera, C., and Choi, J. IoT Journal of Information Security and Applications. 2018;
Connectivity Technologies and Applications: A Survey. 38: 8–27.
IEEE Access. 2020; 8: 67646-67673. [21] Dhanda, S. S., Singh, B. and Jindal, P. Lightweight
[4] Alfred Y. Network Security. Malaysia: Asia Pacific Cryptography: A Solution to Secure IoT. Wireless
University; 2019. pp. 5-11. Personal Communications. 2020; 112(3): 1947–1980.
[5] Tariq, U., Ahmed, I., Bashir, A.K., Shaukat, K. A. Critical [22] Mousavi, S. K., Ghaffari, A., Besharat, S., et al. Security
Cybersecurity Analysis and Future Research Directions of internet of things based on cryptographic algorithms: a
for the Internet of Things: A Comprehensive survey. Wireless Networks. 2021. 27(2): 1515-1555.
Review. Sensors. 2023; 23: 4117. [23] Dutta, N.S., and Chakraborty, S. A survey on
[6] Caraveo-Cacep, M.A., Vázquez-Medina, R., Zavala, A.H. implementation of lightweight block ciphers for resource
A survey on low-cost development boards for applying constraints devices. Journal of Discrete Mathematical
cryptography in IoT systems. Internet of Things. 2023; 22: Sciences and Cryptography. 2020; 1–22.
100743. [24] Rana, M., Mamun, Q., and Islam, R. Lightweight
[7] Majumdar, A., Laskar, N.M., Biswas, A., Sood, S.K., cryptography in IoT networks: A survey. Future
Baishnab, K.L. Energy efficient e-healthcare framework Generation Computer Systems. 2022; 129: 77-89.
using HWPSO-based clustering approach. J Intell Fuzzy [25] Bhardwaj, I., Kumar, A., and Bansal, M. A review on
Syst. 2018; 36(5):1–13. lightweight cryptography algorithms for data security and
[8] Velmurugan, T., Prakasam, P., Mohameed, V.N., authentication in IoTs. In: International Conference on
Saravanan, K. Smart garbage monitoring and navigation Signal Processing, Computing and Control (ISPCC),
system using IoT. Int. J. Innov. Technol. Expl. Eng. 2019; Solan, India; 2017. p. 504-509.
8 (11): 3992–3996. [26] Okello, W.J., Liu, Q., Siddiqui, F.A. and Zhang, C. A
[9] Mista, S., Roy, C., Mukherjee, A. Introduction to survey of the current state of lightweight cryptography for
Industrial Internet of Things and Industry 4.0. 1st ed. the Internet of things. In: International Conference on
Florida: CRC Press; 2021. Computer, Information and Telecommunication Systems
[10] Stolojescu-Crisan, C., Crisan, C., & Butunoi, B. P. An iot (CITS), Dalian, China; 2017. p. 292-296.
based smart home automation system. Sensors. 2021; [27] Wei, Y., Xu, P., and Rong, Y. Related-key impossible
21(11): 3784. differential cryptanalysis on lightweight cipher TWINE. J
[11] Abu-Tair, M., Djahel, S., Perry, P., et al. Towards secure Ambient Intell Human Comput. 2019; 10(2): 509–517.
and privacy-preserving IoT enabled smart home: [28] Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H. Advanced
architecture and experimental study. Sensors. 2020; lightweight encryption algorithms for IoT devices: survey,
20(21): 6131. challenges and solutions. J Ambient Intell Human
[12] William, S. Cryptography and Network Security: Comput. 2017; 1–18.
Principles and Practice. 8th ed. London: Pearson; 2017. [29] Yu, W., and Kose, S. A Lightweight Masked AES
[13] Gunathilake, N. A., Buchanan, W. J., and Asif, R. Next Implementation for Securing IoT Against CPA Attacks.
Generation Lightweight Cryptography for Smart IoT IEEE Transactions on Circuits and Systems I: Regular
Devices: Implementation, Challenges and Applications. Papers. 2017; 64(11) : 2934-2944.
[30] Jithendra, K. B. and Shahana, T.K. New Results in [43] Majhi, S., and Mitra, P. Lightweight Cryptographic
Related Key Impossible Differential Cryptanalysis on Techniques in 5G Software-Defined Internet of Things
Reduced Round AES-192. International Conference On Networking. Lightweight Cryptographic Techniques and
Advances in Communication and Computing Technology Cybersecurity Approaches. 2022. IntechOpen.
(ICACCT), Sangamner, India; 2018. p. 1-5. [44] Moradi., A. Pushing the Limits: A Very Compact and a
[31] Pammu, A. A., Chong, K. -S., Ho, W.-G., and Gwee, B. - Threshold Implementation of AES. In: Advances in
H. Interceptive side channel attack on AES-128 wireless Cryptology – EUROCRYPT, Lecture Notes in Computer
communications for IoT applications. In: IEEE Asia Science, Springer; 2011. 6632. p. 69-88.
Pacific Conference on Circuits and Systems (APCCAS), [45] Surendran, S., Nassef, A., & Beheshti, B. D. A survey of
Jeju, Korea (South); 2016. p. 650-653. cryptographic algorithms for IoT devices. In: IEEE Long
[32] Zhu, L., Wang, Y., and Li, R. Efficient differential fault Island Systems, Applications and Technology Conference
analysis attacks to AES decryption for low ost sensors in (LISAT); 2018. p. 1-8.
IoTs. In: IEEE International Symposium on Circuits and [46] Zhang, X.; Tang, S.; Li, T.; Li, X.; Wang, C. GFRX: A
Systems (ISCAS), Montreal, QC, Canada; 2016. p. 554- New Lightweight Block Cipher for Resource-Constrained
557. IoT Nodes. Electronics. 2023; 12: 405.
[33] Reyhani-masoleh, A., Taha, M., and Ashmawy, D. New [47] Biswas, A., Majumdar, A., Nath, S. et al. LRBC: a
Area Record for the AES Combined S-box / Inverse S- lightweight block cipher design for resource constrained
box. In: IEEE 25th Symposium on Computer Arithmetic IoT devices. J Ambient Intell Human Comput. 2023; 14:
(ARITH), Amherst, MA, USA; 2018. p. 145-152. 5773–5787.
[34] Shah, T., Haq, T. U., Farooq, G. Serpent Algorithm: An [48] Roy, S., Roy, S., Biswas, A., Baishnab, K. L. LCB: Light
improvement by 4 × 4 S - box from finite Chain ring. In: Cipher Block An Ultrafast Lightweight Block Cipher For
International Conference on Applied and Engineering Resource Constrained IOT Security Applications. KSII
Mathematics (ICAEM), Taxila, Pakistan; 2018. p. 1-6. Transactions on Internet and Information Systems. 2021;
[35] Parikh, P., and Narkhede, S. High performance 15(11): 4122-4144.
implementation of mixing of column and inv-mixing of [49] Rana, M., Mamun, Q., and Islam, R. A block cipher for
column for AES on FPGA. In: International Conference resource-constrained IoT devices. World Academy of
on Computation of Power, Energy Information and Science, Engineering and Technology. 2023; 17(3): 266-
Commuincation (ICCPEIC), Melmaruvathur, India; 2016. 271.
p. 174-179. [50] Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B.,
[36] Li, H., and Friggstad, Z. An efficient architecture for the Smith, J., and Wingers, L. The SIMON and SPECK
AES mix columns operation. In: IEEE International lightweight block ciphers. In: 52nd ACM/EDAC/IEEE
Symposium on Circuits and Systems (ISCAS), Kobe; Design Automation Conference (DAC), San Francisco,
2005. vol 5. p. 4637-4640. CA, USA; 2015. p. 1-6.
[37] Banik, S., Bogdanov, A., and Regazzoni, F. Exploring [51] Rashidi, B. Lightweight Cryptographic S-Boxes Based on
Energy Efficiency of Lightweight Block Ciphers. In: Efficient Hardware Structures for Block Ciphers, ISeCure,
Dunkelman, O., Keliher, L. (eds) Selected Areas in 2023; 15(1): 137-151.
Cryptography – SAC, Lecture Notes in Computer Science, [52] Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.
Springer; 2015. vol 9566. Twine: a lightweight, versatile block cipher. In: ECRYPT
[38] Zhao, W., Ha, Y., and Alioto, M. AES architectures for workshop on lightweight cryptography; 2011, p. 146–169.
minimum energy operation and silicon demonstration in [53] Agwa, S., Yahya, E., and Ismail, Y. Power efficient AES
65nm with lowest energy encryption. In: IEEE core for IoT constrained devices implemented in 130nm
International Symposium on Circuits and Systems CMOS. In: IEEE International Symposium on Circuits
(ISCAS), Lisbon, Portugal; 2015. p. 2349-2352. and Systems (ISCAS), Baltimore, MD, USA; 2017. p. 1-4.
[39] Shirai, T., Shibutani, K., Akishita, T., Moriai, S., and [54] Bui, D. -H., Puschini, D., Bacles-Min, S., Beigné, E., and
Iwata, T. The 128-Bit Blockcipher CLEFIA (Extended Tran, X. -T. AES Datapath Optimization Strategies for
Abstract). In: Biryukov, A. (eds) Fast Software Low-Power Low-Energy Multisecurity-Level Internet-of-
Encryption. FSE Lecture Notes in Computer Science, Things Applications. IEEE Transactions on Very Large
Springer, Berlin, Heidelberg; 2007. vol 4593. Scale Integration (VLSI) Systems. 2017; 25(12): 3281-
[40] Kim, B., Cho, J., Choi, B., Park, J., Seo, H. Compact 3290.
Implementations of HIGHT Block Cipher on IoT [55] Ibrahim, N, and Agbinya, J. Design of a Lightweight
Platforms. Security and Communication Networks. 2019; Cryptographic Scheme for Resource-Constrained Internet
5323578: 1-10. of Things Devices. Applied Science. 2023; 13(7): 4398.
[41] Leander, G., Paar, C., Poschmann, A., Schramm, K. New [56] Thabit, F., Can, O., Aljahdali, A.O., Al-Gaphari, G.H.,
Lightweight DES Variants. In: Biryukov, A. (eds) Fast Alkhzaimi, H.A. Cryptography Algorithms for Enhancing
Software Encryption. FSE 2007. Lecture Notes in IoT Security. Internet of Things. 2023; 22: 100759.
Computer Science, Springer, Berlin, Heidelberg; 2007.
vol 4593. p. 196-210.
[42] Bogdanov. A., Knudsen, L.R., Leander, G., Paar, C.,
Poschmann. A., Robshaw, M.J.B., Seurin, Y., and
Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block
Cipher. In: Paillier, P., Verbauwhede, I. (eds)
Cryptographic Hardware and Embedded Systems - CHES.
Lecture Notes in Computer Science, vol 4727. Springer,
Berlin, Heidelberg; 2007.