Lightweight Block and Stream Cipher Algorithm: A Review

Authors

  • Suaad Ali Abead Department of Computer Science, College of Science for Women, University of Baghdad, Baghdad, Iraq
  • Nada Hussein M. Ali Department of Computer Science, College of Science, University of Baghdad

DOI:

https://doi.org/10.37385/jaets.v5i2.3966

Keywords:

IoT security, Lightweight encryption, Block cipher, Stream cipher, Privacy, Integrity

Abstract

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Downloads

Download data is not yet available.

References

Abd Zaid, M., & Hassan, S. (2022). Proposal Framework to Light Weight Cryptography Primitives. Engineering and Technology Journal, 40(4), 516–526. https://doi.org/10.30684/etj.v40i4.1679

Abdalsatir, A. T., & Abboud, A. J. (2019). Integrity Checking of Several Program Codes. Journal of Engineering and Applied Sciences, 14(13), 4435–4441. https://doi.org/10.36478/jeasci.2019.4435.4441

Abdulameer, S. A., Kashmar, A. H., & Shihab, A. I. (2020). A cryptosystem for database security based on TSFS algorithm. Baghdad Science Journal, 17(2), 567–574. https://doi.org/10.21123/bsj.2020.17.2.0567

Abed, M. M., & Younis, M. F. (2019). Developing load balancing for IoT - Cloud computing based on advanced firefly and weighted round robin algorithms. Baghdad Science Journal, 16(1), 130–139. https://doi.org/10.21123/bsj.2019.16.1.0130

Ahmed Faiq Al-Alawy, Al-Abod, E. E., & Raya Mohammed Kadhim. (2018). Journal of engineering. The Journal of Engineering, 2019(16), 2597–2603. https://digital-library.theiet.org/content/journals/10.1049/joe.2018.8601

Alassaf, N., Gutub, A., Parah, S. A., & Al Ghamdi, M. (2019). Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimedia Tools and Applications, 78(23), 32633–32657. https://doi.org/10.1007/s11042-018-6801-z

Al-Husainy, M. A. & & Al-Shargabi, B. (2020). Secure and lightweight encryption model for IoT surveillance camera. International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 1840–1847. https://doi.org/10.30534/ijatcse/2020/143922020

Al-Husainy, M. A. F., Al-Shargabi, B., & Aljawarneh, S. (2021). Lightweight cryptography system for IoT devices using DNA. Computers and Electrical Engineering, 95(August 2020), 107418. https://doi.org/10.1016/j.compeleceng.2021.107418

Aljabri, Z., Abawajy, J., & Huda, S. (2023). A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices. Wireless Communications and Mobile Computing, 2023. https://doi.org/10.1155/2023/9071969

Almalkawi, I. T., Halloush, R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019). A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications. Journal of Information Security and Applications, 49, 102384. https://doi.org/10.1016/j.jisa.2019.102384

Anwar, M. N. Bin, & Maha, M. M. (2020). AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks. International Journal of Innovative Science and Research Technology, 5(6), 1142–1146. https://doi.org/10.38124/ijisrt20jun975

Asaad, R. R., Abdurahman, S. M., & Hani, A. A. (2017). Partial image encryption using RC4 stream cipher approach and embedded in an image. Academic Journal of Nawroz University, 6(3), 40-45.? https://doi.org/10.25007/ajnu.v6n3a76

Badr, A. M., Zhang, Y., & Ahmad Umar, H. G. (2019). Dual authentication-based encryption with a delegation system to protect medical data in cloud computing. Electronics, 8(2), 171.? https://doi.org/10.3390/electronics8020171

Buchanan, W. J., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201.?https://doi.org/10.1080/23742917.2017.1384917

Chaudhary, R. R. K., & Chatterjee, K. (2020). An efficient lightweight cryptographic technique for iot based E-healthcare system. 2020 7th International Conference on Signal Processing and Integrated Networks, SPIN 2020, 991–995. https://doi.org/10.1109/SPIN48934.2020.9071421

Chen, Y. C., Hung, T. H., Hsieh, S. H., & Shiu, C. W. (2019). A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms. IEEE Transactions on Information Forensics and Security, 14(12), 3332–3343. https://doi.org/10.1109/TIFS.2019.2914557

Chiadighikaobi, I. R., & Katuk, N. (2021). A scoping study on lightweight cryptography reviews in IoT. Baghdad Science Journal, 18(2), 989–1000. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0989

Cusick, T. W., & Stanica, P. (2017). Cryptographic Boolean functions and applications. Academic Press.?

Fadhil, M. S., Farhan, A. K., & Fadhil, M. N. (2021). A lightweight aes algorithm implementation for secure iot environment. Iraqi Journal of Science, 62(8), 2759–2770. https://doi.org/10.24996/ijs.2021.62.8.29

Fotovvat, A., Rahman, G. M. E., Vedaei, S. S., & Wahid, K. A. (2021). Comparative Performance Analysis of Lightweight Cryptography Algorithms for IoT Sensor Nodes. IEEE Internet of Things Journal, 8(10), 8279–8290. https://doi.org/10.1109/JIOT.2020.3044526

George, L. E., Hassan, E. K., Mohammed, S. G., & Mohammed, F. G. (2020). Selective image encryption based on DCT, hybrid shift coding and randomly generated secret key. Iraqi Journal of Science, 61(4), 920–935. https://doi.org/10.24996/ijs.2020.61.4.25

Ghareeb, Y. A., & Gbashi, E. K. (2022). A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak). Iraqi Journal of Computer, Communication, Control and System Engineering, 22(2), 53–62. https://doi.org/10.33103/uot.ijccce.22.2.5

Hameed, S. M., Sa’adoon, H. A., & Al-Ani, M. (2018). Image encryption using DNA encoding and RC4 algorithm. Iraqi Journal of Science, 59(1B), 434–446. https://doi.org/10.24996/IJS.2018.59.1B.24

Hasan, M. K., Islam, S., Sulaiman, R., Khan, S., Hashim, A. H. A., Habib, S., Islam, M., Alyahya, S., Ahmed, M. M., Kamil, S., & Hassan, M. A. (2021). Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications. IEEE Access, 9, 47731–47742. https://doi.org/10.1109/ACCESS.2021.3061710

Hasan, M. Y., & Kadhim, D. J. (2022). Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System. Journal of Engineering, 28(1), 108–121. https://doi.org/10.31026/j.eng.2022.01.08

Hussein Ali, N. M., & Ali Abead, S. (2016). Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes. Journal of Science, 57(4C), 2968–2978.

Hussein, S. N., Obaid, A. H., & Jabbar, A. (2022). Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm. Iraqi Journal of Science, 63(11), 5037–5045. https://doi.org/10.24996/ijs.2022.63.11.38

Jallouli, O., Chetto, M., & Assad, S. El. (2022). Lightweight Stream Ciphers based on Chaos for Time and Energy Constrained IoT Applications. 2022 11th Mediterranean Conference on Embedded Computing, MECO 2022. https://doi.org/10.1109/MECO55406.2022.9797087

K, S., & A, C. (2021). A Review on Lightweight Block Ciphers. SSRN Electronic Journal, 146–150. https://doi.org/10.2139/ssrn.3794162

Kapalova, N., Algazy, K., & Haumen, A. (2023). Development of a New Lightweight Encryption Algorithm. Eastern-European Journal of Enterprise Technologies, 3(9(123)), 6–19. https://doi.org/10.15587/1729-4061.2023.280055

Khashan, O. A., Ahmad, R., & Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115(October 2020), 102448. https://doi.org/10.1016/j.adhoc.2021.102448

Kousalya, R., & Sathish Kumar, G. A. (2019). A Survey of Light-Weight Cryptographic Algorithm for Information Security and Hardware Efficiency in Resource Constrained Devices. Proceedings - International Conference on Vision Towards Emerging Trends in Communication and Networking, ViTECoN 2019, 1–5. https://doi.org/10.1109/ViTECoN.2019.8899376

Mahlake, N., Mathonsi, T. E., Du Plessis, D., & Muchenje, T. (2023). A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things. Journal of Communications, 18(1), 47–57. https://doi.org/10.12720/jcm.18.1.47-57

Majeed, G. H., & Rokan, J. (2020). Internet of Things Authentication Based on Chaos-Lightweight Bcrypt Internet of Things Authentication Based on Chaos-Lightweight Bcrypt chaos-Blowfish ( Jolan Rokan Naif Informatics. February, 35–50.

Melki, R., Noura, H. N., & Chehab, A. (2020). Lightweight multi-factor mutual authentication protocol for IoT devices. International Journal of Information Security, 19(6), 679–694. https://doi.org/10.1007/s10207-019-00484-5

Mileva, A., Dimitrova, V., Kara, O., & Mihaljevi?, M. J. (2021). Catalog and Illustrative Examples of Lightweight Cryptographic Primitives. Security of Ubiquitous Computing Systems: Selected Topics, 21–47. https://doi.org/10.1007/978-3-030-10591-4_2

Mohammed, R. S. (2023). Design a Lightweight Authentication Encryption Based on Stream Cipher and Chaotic Maps with Sponge Structure for Internet of Things Applications. International Journal of Intelligent Engineering and Systems, 16(1), 532–547. https://doi.org/10.22266/ijies2023.0228.46

Mohandas, N. A., Swathi, A., Abhijith, R., Nazar, A., & Sharath, G. (2020). A4: A lightweight stream cipher. In 2020 5th international conference on communication and electronics systems (ICCES) (pp. 573-577). IEEE. https://doi.org/10.1109/ICCES48766.2020.9138048

Nayancy, Dutta, S., & Chakraborty, S. (2022). A survey on implementation of lightweight block ciphers for resource constraints devices. Journal of Discrete Mathematical Sciences and Cryptography, 25(5), 1377–1398. https://doi.org/10.1080/09720502.2020.1766764

Panahi, P., Bay?lm??, C., Çavu?o?lu, U., & Kaçar, S. (2021). Performance Evaluation of Lightweight Encryption Algorithms for IoT-Based Applications. Arabian Journal for Science and Engineering, 46(4), 4015–4037. https://doi.org/10.1007/s13369-021-05358-4

Roy, S., Shrivastava, M., Pandey, C. V., Nayak, S. K., & Rawat, U. (2021). IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimedia Tools and Applications, 80(21–23), 31529–31567. https://doi.org/10.1007/s11042-020-09880-9

Saadatnejad, S., Oveisi, M., & Hashemi, M. (2020). LSTM-Based ECG Classification for Continuous Monitoring on Personal Wearable Devices. IEEE Journal of Biomedical and Health Informatics, 24(2), 515–523. https://doi.org/10.1109/JBHI.2019.2911367

Saddam, M. J., Ibrahim, A. A., & Mohammed, A. H. (2020). A Lightweight Image Encryption and Blowfish Decryption for the Secure Internet of Things. 4th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2020 - Proceedings. https://doi.org/10.1109/ISMSIT50672.2020.9254366

Sevin, A., & Mohammed, A. A. O. (2023). A survey on software implementation of lightweight block ciphers for IoT devices. Journal of Ambient Intelligence and Humanized Computing, 14(3), 1801–1815. https://doi.org/10.1007/s12652-021-03395-3

Shilpa, K. & Chinchu. A. (2021). A review on lightweight block ciphers. Proceedings of the International Conference on Systems, Energy & Environment (ICSEE) 2021. http://dx.doi.org/10.2139/ssrn.3791092

Singh, P., Acharya, B., & Chaurasiya, R. K. (2020). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In Security and Privacy Issues in IoT Devices and Sensor Networks. Elsevier Inc. https://doi.org/10.1016/B978-0-12-821255-4.00008-0

Singh, P., Agrawal, B., Chaurasiya, R. K., & Acharya, B. (2023). Low-area and high-speed hardware architectures of KLEIN lightweight block cipher for image encryption. Journal of Electronic Imaging, 32(01). https://doi.org/10.1117/1.jei.32.1.013012

Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 1-18.? https://doi.org/10.1007/s12652-017-0494-4

Taha, M. H., & Al-Tuwaijari, J. M. (2021). Improvement of Chacha20 algorithm based on tent and Chebyshev chaotic maps. Iraqi Journal of Science, 62(6), 2029–2039. https://doi.org/10.24996/ijs.2021.62.6.29

Tawalbeh, L., Alicea, M., & Alsmadi, I. (2022). New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications. Procedia Computer Science, 203(2019), 111–118. https://doi.org/10.1016/j.procs.2022.07.016

Thabit, F., Alhomdy, A. P. S., Al-Ahdal, A. H. A., & Jagtap, P. D. S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings, 2(1), 91–99. https://doi.org/10.1016/j.gltp.2021.01.013

Tiwari, H. (2017). Merkle-Damgård construction method and alternatives: a review. Journal of Information and Organizational Sciences, 41(2), 283-304.?

Xiao-Mei, L., & Yong, Q. (2019). Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things. Proceedings of 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2019, Itaic, 1717–1720. https://doi.org/10.1109/ITAIC.2019.8785584

Yousif, S. T., & Fadahl, Z. A. (2021). Proposed Security Framework for Mobile Data Management System. Journal of Engineering, 27(7), 13–23. https://doi.org/10.31026/j.eng.2021.07.02

Zang, Y., Yu, B., & Zhao, S. (2023). Lightweight seatbelt detection algorithm for mobile device. Multimedia Tools and Applications, 82(16), 24505–24519. https://doi.org/10.1007/s11042-023-14555-2

Zhao, J., Hu, H., Huang, F., Guo, Y., & Liao, L. (2023). Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios. Electronics (Switzerland), 12(8), 1–21. https://doi.org/10.3390/electronics12081812

Downloads

Published

2024-06-06

How to Cite

Abead, S. A., & Ali, N. H. M. (2024). Lightweight Block and Stream Cipher Algorithm: A Review. Journal of Applied Engineering and Technological Science (JAETS), 5(2), 860–874. https://doi.org/10.37385/jaets.v5i2.3966