Research Output

Lightweight cryptography methods

  While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks. Thus lightweight cryptography methods are proposed to overcome many of the problems of conventional cryptography. This includes constraints related to physical size, processing requirements, memory limitation and energy drain. This paper outlines many of the techniques that are defined as replacements for conventional cryptography within an Internet of Things (IoT) space and discuss some trends in the design of lightweight algorithms.

  • Type:

    Article

  • Date:

    05 March 2018

  • Publication Status:

    Published

  • DOI:

    10.1080/23742917.2017.1384917

  • Cross Ref:

    10.1080/23742917.2017.1384917

  • ISSN:

    2374-2917

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

  • Funders:

    Edinburgh Napier Funded

Citation

Buchanan, W. J., Li, S., & Asif, R. (2018). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917

Authors

Keywords

Lightweight cryptography, Resource limited; devices, encryption, Hashing functions PHOTON, SPONGENT,; Lesamanta-LW, Enocoro, Trivium, PRESENT, CLEFIA

Monthly Views:

Available Documents