IoT Light Weight (LWT) Crypto Functions

We are in the era of IoT and 5G technologies. IoT has wide range of applications in Smart Home, Smart cities, Agriculture, Health etc. Due to that, the number of connected sensor devices become increased. Along with that security of these devices become a challenging issue. By the next year there would be a great increase in the number of connected sensor devices. For the power constrained devices like sensors and actuators, they requires lightweight security mechanism. There are several Lightweight (LW) energy efficient Hashing techniques are available. They are photon, quark, spongent, Lesamnta-LW etc. These all are fixed length block sized and key sized LW hashing techniques. All transformation methods used today in LW hash function only support fixed block size and key size and requires high hardware requirements too. In this paper, we compare different types of LW hash families in terms of their design and introduce the possibility of variable length hash function using Mersenne number based transform.

[1]  B. Cristina Pelayo García-Bustelo,et al.  Midgar: Study of communications security among Smart Objects using a platform of heterogeneous devices for the Internet of Things , 2017, Future Gener. Comput. Syst..

[2]  Anne Canteaut,et al.  Differential Attacks Against SPN: A Thorough Analysis , 2015, C2SI.

[3]  Vincent Rijmen,et al.  A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT , 2015, FSE.

[4]  Zhou Wanting,et al.  Radix-8 algorithm for the new Mersenne number transform , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).

[5]  Shuang Wu,et al.  LHash: A Lightweight Hash Function , 2013, Inscrypt.

[6]  Dawu Gu,et al.  Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network , 2018, KSII Trans. Internet Inf. Syst..

[7]  Andrey Bogdanov,et al.  APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography , 2014, FSE.

[8]  Said Boussakta,et al.  Assessment of the One-Dimensional Generalized New Mersenne Number Transform for Security Systems , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[9]  François-Xavier Standaert,et al.  A Statistical Saturation Attack against the Block Cipher PRESENT , 2009, CT-RSA.

[10]  Shoichi Hirose,et al.  Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension , 2016, 2016 Fourth International Symposium on Computing and Networking (CANDAR).