A Comparative Study on Lightweight Cryptography

The traditional cryptosystem only fulfills the requirements of desktop computing epoch. Renewable lightweight cryptography algorithms are developing to beat the constraints of traditional cryptosystem, which provide tradeoff among cipher sort, attack immune, key size, plaintext length, and performance. The implementation of LWC algorithms is carried out on retaining in the mind that it will be implemented in minimal power consumption, fewer area requirement and also enough efficiency so it turns out to be ideal for such a resource confine devices such as RFID tags and wireless sensor node. In this, we are trying to emerge with frequent LWC algorithms which are grouped into stream cipher, block cipher, and hybrid model, and also reveal them, at the last a comparison is conducted on the effective parameters.

[1]  Stephen Gardner,et al.  Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.

[2]  Debdeep Mukhopadhyay,et al.  Cryptanalysis of Composite PUFs (Extended abstract-invited talk) , 2014, 18th International Symposium on VLSI Design and Test.

[3]  Jean-Jacques Quisquater,et al.  Practical Algebraic Attacks on the Hitag2 Stream Cipher , 2009, ISC.

[4]  Guang Gong,et al.  WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices , 2015, EAI Endorsed Trans. Security Safety.

[5]  Jacob John Cryptography for Resource Constrained Devices: A Survey , 2012 .

[6]  Ron Steinfeld,et al.  Cryptanalysis of WG-7: a lightweight stream cipher , 2012, Cryptography and Communications.

[7]  Goutam Paul,et al.  (Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher , 2012, Journal of Cryptology.

[8]  Martin Novotný,et al.  Breaking Hitag2 with Reconfigurable Hardware , 2011, 2011 14th Euromicro Conference on Digital System Design.

[9]  Guang Gong,et al.  A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[10]  Joseph Lano,et al.  Probabilistic Factors in the Sober-t Stream Ciphers , 2002 .

[11]  Guang Gong,et al.  WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..

[12]  Adi Shamir,et al.  Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..

[13]  Alexander Maximov Cryptanalysis of the "Grain" family of stream ciphers , 2006, ASIACCS '06.

[14]  Philip Hawkes,et al.  Primitive Specification for SOBER-128 , 2003, IACR Cryptol. ePrint Arch..

[15]  Lei Hu,et al.  Cube Cryptanalysis of Hitag2 Stream Cipher , 2011, CANS.

[16]  T. E. Bjrstad Cryptanalysis of Grain using Time / Memory / Data Tradeos , 2008 .

[17]  Santanu Sarkar,et al.  A Differential Fault Attack on the Grain Family of Stream Ciphers , 2012, CHES.

[18]  Jian Xie,et al.  An improved RC4 stream cipher , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[19]  Dongdai Lin,et al.  Some New Weaknesses in the RC4 Stream Cipher , 2013, WISA.