Skip to main content

Research Repository

Advanced Search

Lightweight cryptography methods

Buchanan, William; Li, Shancang; Asif, Rameez


William Buchanan

Shancang Li

Rameez Asif


While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks. Thus lightweight cryptography methods are proposed to overcome many of the problems of conventional cryptography. This includes constraints related to physical size, processing requirements, memory limitation and energy drain. This paper outlines many of the techniques that are defined as replacements for conventional cryptography within an Internet of Things (IoT) space and discuss some trends in the design of lightweight algorithms.


Buchanan, W., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201.

Journal Article Type Article
Acceptance Date Sep 23, 2017
Online Publication Date Mar 5, 2018
Publication Date Dec 31, 2017
Deposit Date Sep 25, 2017
Publicly Available Date Jan 1, 2019
Journal Journal of Cyber Security Technology
Print ISSN 2374-2917
Peer Reviewed Peer Reviewed
Volume 1
Issue 3-4
Pages 187-201
Keywords lightweight cryptography, resource limited devices, encryption, hashing functions, PHOTON, SPONGENT, lesamanta-LW, enocoro, trivium, PRESENT, CLEFIA
Public URL
Publisher URL


You might also like

Downloadable Citations