Implementation of lightweight cryptographic primitives

Baraa Tareq Hammad, Norziana Jamil, Mohd Ezanee Rusli, Muhammad Reza Z’Aba, Ismail T. Ahmed

Research output: Contribution to journalArticle

Abstract

Lightweight cryptography is not a new branch in cryptography. It is a subject specifically addressing the implementation of security mechanism in pervasive computing that are characterized by smart but resource constrained devices. There are at least two main lightweight symmetric cryptographic primitives namely lightweight block cipher and lightweight hash algorithm. Most of the previous surveys were focusing on implementation of specific cryptographic primitives. In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. We also provide a classification of the structure of lightweight block cipher and lightweight hash function. These classifications are very useful because the primitives have different and sometimes contrary characteristics. Finally this comprehensive survey highlights some of the issues related to security aspect of small key length in lightweight cryptographic primitives.

Original languageEnglish
Pages (from-to)5571-5586
Number of pages16
JournalJournal of Theoretical and Applied Information Technology
Volume95
Issue number20
Publication statusPublished - 31 Oct 2017

Fingerprint

Cryptography
Hash functions
Block Cipher
Ubiquitous computing
Throughput
Hardware
Analysis of Algorithms
Pervasive Computing
Hash Function
Branch
Cover
Cycle
Resources
Software
Energy

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Hammad, Baraa Tareq ; Jamil, Norziana ; Rusli, Mohd Ezanee ; Z’Aba, Muhammad Reza ; Ahmed, Ismail T. / Implementation of lightweight cryptographic primitives. In: Journal of Theoretical and Applied Information Technology. 2017 ; Vol. 95, No. 20. pp. 5571-5586.
@article{c7e69212928e4e59908131804b4ba051,
title = "Implementation of lightweight cryptographic primitives",
abstract = "Lightweight cryptography is not a new branch in cryptography. It is a subject specifically addressing the implementation of security mechanism in pervasive computing that are characterized by smart but resource constrained devices. There are at least two main lightweight symmetric cryptographic primitives namely lightweight block cipher and lightweight hash algorithm. Most of the previous surveys were focusing on implementation of specific cryptographic primitives. In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. We also provide a classification of the structure of lightweight block cipher and lightweight hash function. These classifications are very useful because the primitives have different and sometimes contrary characteristics. Finally this comprehensive survey highlights some of the issues related to security aspect of small key length in lightweight cryptographic primitives.",
author = "Hammad, {Baraa Tareq} and Norziana Jamil and Rusli, {Mohd Ezanee} and Z’Aba, {Muhammad Reza} and Ahmed, {Ismail T.}",
year = "2017",
month = "10",
day = "31",
language = "English",
volume = "95",
pages = "5571--5586",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "20",

}

Implementation of lightweight cryptographic primitives. / Hammad, Baraa Tareq; Jamil, Norziana; Rusli, Mohd Ezanee; Z’Aba, Muhammad Reza; Ahmed, Ismail T.

In: Journal of Theoretical and Applied Information Technology, Vol. 95, No. 20, 31.10.2017, p. 5571-5586.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Implementation of lightweight cryptographic primitives

AU - Hammad, Baraa Tareq

AU - Jamil, Norziana

AU - Rusli, Mohd Ezanee

AU - Z’Aba, Muhammad Reza

AU - Ahmed, Ismail T.

PY - 2017/10/31

Y1 - 2017/10/31

N2 - Lightweight cryptography is not a new branch in cryptography. It is a subject specifically addressing the implementation of security mechanism in pervasive computing that are characterized by smart but resource constrained devices. There are at least two main lightweight symmetric cryptographic primitives namely lightweight block cipher and lightweight hash algorithm. Most of the previous surveys were focusing on implementation of specific cryptographic primitives. In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. We also provide a classification of the structure of lightweight block cipher and lightweight hash function. These classifications are very useful because the primitives have different and sometimes contrary characteristics. Finally this comprehensive survey highlights some of the issues related to security aspect of small key length in lightweight cryptographic primitives.

AB - Lightweight cryptography is not a new branch in cryptography. It is a subject specifically addressing the implementation of security mechanism in pervasive computing that are characterized by smart but resource constrained devices. There are at least two main lightweight symmetric cryptographic primitives namely lightweight block cipher and lightweight hash algorithm. Most of the previous surveys were focusing on implementation of specific cryptographic primitives. In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. We also provide a classification of the structure of lightweight block cipher and lightweight hash function. These classifications are very useful because the primitives have different and sometimes contrary characteristics. Finally this comprehensive survey highlights some of the issues related to security aspect of small key length in lightweight cryptographic primitives.

UR - http://www.scopus.com/inward/record.url?scp=85032807508&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85032807508&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:85032807508

VL - 95

SP - 5571

EP - 5586

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 20

ER -