Skip to main content

Research Repository

Advanced Search

Lightweight cryptography methods

Buchanan, William; Li, Shancang; Asif, Rameez

Lightweight cryptography methods Thumbnail


Authors

William Buchanan

Shancang Li

Rameez Asif



Abstract

While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks. Thus lightweight cryptography methods are proposed to overcome many of the problems of conventional cryptography. This includes constraints related to physical size, processing requirements, memory limitation and energy drain. This paper outlines many of the techniques that are defined as replacements for conventional cryptography within an Internet of Things (IoT) space and discuss some trends in the design of lightweight algorithms.

Citation

Buchanan, W., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917

Journal Article Type Article
Acceptance Date Sep 23, 2017
Online Publication Date Mar 5, 2018
Publication Date Dec 31, 2017
Deposit Date Sep 25, 2017
Publicly Available Date Dec 31, 2018
Journal Journal of Cyber Security Technology
Print ISSN 2374-2917
Peer Reviewed Peer Reviewed
Volume 1
Issue 3-4
Pages 187-201
DOI https://doi.org/10.1080/23742917.2017.1384917
Keywords lightweight cryptography, resource limited devices, encryption, hashing functions, PHOTON, SPONGENT, lesamanta-LW, enocoro, trivium, PRESENT, CLEFIA
Public URL https://uwe-repository.worktribe.com/output/901434
Publisher URL https://doi.org/10.1080/23742917.2017.1384917

Files






Downloadable Citations