Skip to main content

Research Repository

Advanced Search

Lightweight cryptography methods

Buchanan, William J.; Li, Shancang; Asif, Rameez

Authors

Shancang Li

Rameez Asif



Abstract

While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks. Thus lightweight cryptography methods are proposed to overcome many of the problems of conventional cryptography. This includes constraints related to physical size, processing requirements, memory limitation and energy drain. This paper outlines many of the techniques that are defined as replacements for conventional cryptography within an Internet of Things (IoT) space and discuss some trends in the design of lightweight algorithms.

Citation

Buchanan, W. J., Li, S., & Asif, R. (2018). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917

Journal Article Type Article
Acceptance Date Dec 1, 2017
Online Publication Date Mar 5, 2018
Publication Date Mar 5, 2018
Deposit Date Mar 6, 2018
Publicly Available Date Mar 6, 2019
Journal Journal of Cyber Security Technology
Print ISSN 2374-2917
Electronic ISSN 2374-2925
Publisher Taylor & Francis
Peer Reviewed Peer Reviewed
Volume 1
Issue 3-4
Pages 187-201
DOI https://doi.org/10.1080/23742917.2017.1384917
Keywords Lightweight cryptography, Resource limited; devices, encryption, Hashing functions PHOTON, SPONGENT,; Lesamanta-LW, Enocoro, Trivium, PRESENT, CLEFIA
Public URL http://researchrepository.napier.ac.uk/Output/1076885

Files








You might also like



Downloadable Citations