Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things

With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to various assaults. Therefore, hash functions are required to ensure data integrity in IoT networks. IoT systems are constrained by their complexity, necessitating the consumption of minimal computational power. As a result, lightweight hash functions have been selected as the solution for the IoT data integrity issue. We present two lightweight hash functions, Alit-Hash and Tjuilik-Hash, based on the Saturnin block cipher and the Beetle mode of operation. In particular, we created Tjuilik-Hash by modifying the Saturnin block cipher. The strength of the proposed hash functions is evaluated through security analysis and performance testing. Alit-Hash and Tjuilik-Hash both show reasonably good resistance to differential and linear cryptanalysis. Hardware implementations on a cost-effective and low-power microcontroller board (ATmega2560) demonstrate an average execution time of 0.746 microseconds for the Tjuilik-Hash algorithm. Performance evaluations on a 64-bit personal computer indicate that the Alit-Hash and Tjuilik-Hash implementations exhibit comparable speed and throughput to seven other evaluated hash functions. Simulation experiments employing Contiki-NG and the Cooja simulator confirm the good performance of these two hash functions relative to Photon-Beetle-Hash, Photon, and Spongent across five metrics. The hash functions pass seven cryptographic randomness tests and pass all tests in the National Institute of Standards and Technology (NIST) Statistical Test Suite (STS). Therefore, the implementation of both proposed hash functions should be considered, as they are both cost-effective and provide an adequate level of security, which is essential for IoT devices with limited resources.

[1]  Laura J. Bowman Statista , 2022, Journal of Business & Finance Librarianship.

[2]  J. Eriksson,et al.  The Contiki-NG open source operating system for next generation IoT devices , 2022, SoftwareX.

[3]  Eric Pardede,et al.  A Secure Mutual authentication approach to fog computing environment , 2021, Comput. Secur..

[4]  Joan Daemen,et al.  Xoodyak, a lightweight cryptographic scheme , 2020, IACR Trans. Symmetric Cryptol..

[5]  Anne Canteaut,et al.  Saturnin: a suite of lightweight symmetric algorithms for post-quantum security , 2020, IACR Trans. Symmetric Cryptol..

[6]  Alex Biryukov,et al.  Lightweight AEAD and Hashing using the Sparkle Permutation Family , 2020, IACR Trans. Symmetric Cryptol..

[7]  Joan Daemen,et al.  The Subterranean 2.0 Cipher Suite , 2020, IACR Trans. Symmetric Cryptol..

[8]  Taekyoung Kwon,et al.  A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things , 2020, IEEE Access.

[9]  Kun-Lin Tsai,et al.  Secure Session Key Generation Method for LoRaWAN Servers , 2020, IEEE Access.

[10]  Ali Dehghantanha,et al.  A survey on internet of things security: Requirements, challenges, and solutions , 2019, Internet Things.

[11]  Samiran Chattopadhyay,et al.  Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions , 2019, IEEE Access.

[12]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[13]  Chunhua Su,et al.  A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things , 2019, ACM Trans. Embed. Comput. Syst..

[14]  Jing Li,et al.  Cryptographic primitives in blockchains , 2019, J. Netw. Comput. Appl..

[15]  Joan Daemen,et al.  The design of Xoodoo and Xoofff , 2018, IACR Trans. Symmetric Cryptol..

[16]  Kan Yasuda,et al.  Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[17]  Alex Biryukov,et al.  State of the Art in Lightweight Symmetric Cryptography , 2017, IACR Cryptol. ePrint Arch..

[18]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[19]  Ling Cheng,et al.  A New Cryptographic Analysis of 4-bit S-Boxes , 2015, Inscrypt.

[20]  Morris Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[21]  Vincent Rijmen,et al.  A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT , 2015, FSE.

[22]  Fatih Sulak,et al.  A New Statistical Randomness Test: Saturation Point Test , 2013 .

[23]  Andrey Bogdanov,et al.  SPONGENT: The Design Space of Lightweight Cryptographic Hashing , 2011, IEEE Transactions on Computers.

[24]  Andrey Bogdanov,et al.  spongent: A Lightweight Hash Function , 2011, CHES.

[25]  Thomas Peyrin,et al.  The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..

[26]  Guido Bertoni,et al.  Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..

[27]  Markku-Juhani O. Saarinen Cryptographic Analysis of All 4 x 4 - Bit S-Boxes , 2011, IACR Cryptol. ePrint Arch..

[28]  Shoichi Hirose,et al.  A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW , 2010, ICISC.

[29]  Guido Bertoni,et al.  Sponge-Based Pseudo-Random Number Generators , 2010, CHES.

[30]  Andrey Bogdanov,et al.  Hash Functions and RFID Tags: Mind the Gap , 2008, CHES.

[31]  Gregor Leander,et al.  On the Classification of 4 Bit S-Boxes , 2007, WAIFI.

[32]  Douglas R. Stinson,et al.  Some Observations on the Theory of Cryptographic Hash Functions , 2006, Des. Codes Cryptogr..

[33]  Eric Filiol,et al.  A New Statistical Testing for Symmetric Ciphers and Hash Functions , 2002, ICICS.

[34]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[35]  Ross J. Anderson,et al.  Serpent: A New Block Cipher Proposal , 1998, FSE.

[36]  M. Suryanegara,et al.  A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128 , 2022, IEEE Access.

[37]  S. Suryadi,et al.  Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions , 2022, IEEE Access.

[38]  M. Suryanegara,et al.  A Novel Session Key Update Scheme for LoRaWAN , 2022, IEEE Access.

[39]  Xiaoyang Dong,et al.  Triangulating Rebound Attack on AES-like Hashing , 2022, IACR Cryptol. ePrint Arch..

[40]  Avik Chakraborti,et al.  PHOTON -Beetle Authenticated Encryption and Hash Family , 2021 .

[41]  Lei Hu,et al.  Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials , 2021, IACR Cryptol. ePrint Arch..

[42]  Jian Guo,et al.  Quantum Multi-Collision Distinguishers , 2021, IACR Cryptol. ePrint Arch..

[43]  Goutam Saha,et al.  LightBC: A Lightweight Hash-Based Blockchain for the Secured Internet of Things , 2020 .

[44]  Hongjun Wu,et al.  TinyJAMBU : A Family of Lightweight Authenticated Encryption Algorithms ( Version 2 ) , 2019 .

[45]  Martin Hell Grain-128AEADv2-A lightweight AEAD stream cipher Cover sheet , 2019 .

[46]  Joan Daemen,et al.  Xoodoo cookbook , 2018, IACR Cryptol. ePrint Arch..

[47]  Marek Sýs,et al.  Algorithm 970 , 2016, ACM Trans. Math. Softw..

[48]  G. V. Assche,et al.  Permutation-based encryption , authentication and authenticated encryption , 2012 .

[49]  Onur Koçak,et al.  Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..

[50]  G. V. Assche,et al.  Sponge Functions , 2007 .