Abstract

In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application and how it assists in using hardware such as the internet of things. For a long time there seems to be little progress in applying pure mathematics in providing security since the wide progress made by George Boole and Shannon. We discuss cryptanalysis of Boolean functions to avoid trapdoors and vulnerabilities in the development of block ciphers. It appears that there is significant progress. A comparative analysis of lightweight cryptographic schemes is reported in terms of execution time, code size and throughput. Depending on the schemes and the structure of the algorithms, these parameters change but remain within reasonable values making them suited for Internet of things applications. The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of IoT systems. Broadly speaking, lightweight cryptographic algorithms are designed to achieve two main goals. The first goal of a cryptographic algorithm is to withstand all known cryptanalytic attacks and thus to be secure in the black-box model. The second goal is to build the cryptographic primitive in such a way that its implementations satisfy a clearly specified set of constraints that depend on a case-by-case basis.

Highlights

  • Data security is an important issue in any wireless cryptographic protocol; a cryptographic algorithm is an essential part of network security

  • The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of Internet of Things (IoT) systems

  • We find Boolean functions in stream ciphers, in S-boxes in block ciphers

Read more

Summary

Introduction

Data security is an important issue in any wireless cryptographic protocol; a cryptographic algorithm is an essential part of network security. Most of the above IoT devices suffer from many limitations. The structure of the paper is as follows: Section 2 discusses different types of cryptographic techniques. This paper should not consider as a comprehensive history of cryptology or the algorithms themselves, but rather a focused review on lightweight cryptography for IoT.

Lightweight Cryptographic Schemes
A Lightweight Cryptographic Scheme for IoT
Bit of History
Cryptanalysis of Boolean Functions
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call