An Efficient Lightweight Cryptography Hash Function for Big Data and IoT Applications

This paper introduces a lightweight cryptography hash function for big data and IoT applications. The proposed design employs S-Box, linear transformation, and bit permutation functionalities. Conventional hash functions require memory and time to process big data and IoT applications. Therefore, a secure and quick lightweight cryptography protocol is needed. This design provides the security requirements of the conventional hash functions and the specifications of the lightweight cryptography protocols. The proposed design is tested and verified using three of the lightweight requirements: speed, memory and power consumption. The results show that the proposed design outperforms other lightweight protocols in terms of speed, memory and power consumption. Moreover, the security analysis shows that this design posses the general security requirements of the conventional hash protocols.

[1]  Kaisa Nyberg,et al.  Perfect Nonlinear S-Boxes , 1991, EUROCRYPT.

[2]  Christof Paar,et al.  A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.

[3]  Samee Ullah Khan,et al.  The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).

[4]  Mazhar Ali,et al.  Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques , 2020, ACM Comput. Surv..

[5]  Willi Meier,et al.  Quark: A Lightweight Hash , 2010, Journal of Cryptology.

[6]  Thomas Peyrin,et al.  The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..

[7]  Manoj Kumar Biswas,et al.  Neeva: A Lightweight Hash Function , 2016, IACR Cryptol. ePrint Arch..

[8]  C. Sanchez-Avila,et al.  The Rijndael block cipher (AES proposal) : a comparison with DES , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[9]  Puliparambil Megha Mukundan,et al.  Hash-One: a lightweight cryptographic hash function , 2016, IET Inf. Secur..

[10]  Andrey Bogdanov,et al.  spongent: A Lightweight Hash Function , 2011, CHES.

[11]  Sattar B. Sadkhan,et al.  A survey on lightweight-cryptography status and future challenges , 2018, 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA).

[12]  Amir Moradi,et al.  Lightweight Cryptography and DPA Countermeasures: A Survey , 2010, Financial Cryptography Workshops.

[13]  Vinayaka,et al.  Improving Diffusion Power of AES Rijndael with 8x8 MDS Matrix , 2011 .

[14]  Hongjun Wu,et al.  The Hash Function JH , 2009 .

[15]  Mohamed Elhoseny,et al.  An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks , 2019, Lecture Notes in Electrical Engineering.

[16]  Athanasios V. Vasilakos,et al.  IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.

[17]  Jong Hyuk Park,et al.  Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..

[18]  M. Alizadeh,et al.  Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID , 2012 .

[19]  OKAMURA Toshihiko Lightweight Cryptography Applicable to Various IoT Devices , 2017 .