Abstract

IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications. Encryption is necessary for security when using these limited-resource devices, but conventional cryptographic algorithms are too heavyweight and resource-demanding to run on IoT infrastructures. This paper presents a lightweight version of AES (called LAES), which provides competitive results in terms of randomness levels and processing time, operating on GF(24). Detailed mathematical operations and proofs are presented concerning LAES rounds design fundamentals. The proposed LAES algorithm is evaluated based on its randomness, performance, and power consumption; it is then compared to other cryptographic algorithm variants, namely Present, Clefia, and AES. The design of the randomness and performance analysis is based on six measures developed with the help of the NIST test statistical suite of cryptographic applications. The performance and power consumption of LAES on a low-power, 8-bit microcontroller unit were evaluated using an Arduino Uno board. LAES was found to have competitive randomness levels, processing times, and power consumption compared to Present, Clefia, and AES.

Highlights

  • The proposed Lightweight Advanced Encryption Standard (LAES) algorithm is evaluated based on its randomness, performance, and power consumption; it is compared to other cryptographic algorithm variants, namely Present, Clefia, and Advanced Encryption Standard (AES)

  • This paper investigates the same approach by proposing a lightweight cryptographic algorithm based on the Advanced Encryption Standard (AES), which we call

  • The evaluation was conducted using several measures designed based on the guidance of the NIST statistical test suite for cryptographic applications [27]: frequency test, block test, runs test, effective encryption time, average encryption time for a single block, and average encryption time for a single round

Read more

Summary

Introduction

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. NIST launched its lightweight cryptography project in 2013, highlighting the need for lightweight cryptographic algorithms that meet the requirements of constrained environments with limited processing speeds, resources, and energy. In 2015, NIST convened the 1st Lightweight Cryptography Workshop to explore concerns such as application security and resource needs in limited environments, as well as the possibilities for future lightweight primitive standardization. NIST’s 2nd Lightweight Cryptography Workshop (2016) decided to create a portfolio to discuss lightweight algorithms through an open process, similar to the criteria for block cipher selection.

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call