2022
DOI: 10.1002/cpe.7425
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications

Abstract: Summary Lightweight cryptography is a rapidly developing research field. Its main goal is to provide security for devices with fewer resources. These limited‐resource devices implement reliable ciphers that use very little power and computation. The lightweight cipher should be built for high performance while using the fewest resources possible, such as memory and power. In this article, we compare block ciphers and several other stream ciphers based on criteria such as input size, output size, structure empl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 67 publications
0
4
0
Order By: Relevance
“…By using the exclusive-or (XOR) function, stream ciphers combine a stream of plaintext sequences with a stream of pseudorandom cryptographic hash sequences to encrypt data. If used properly, stream ciphers can provide a robust layer of security for a wide range of communications settings, including wireless networks, the Internet, and associated transactions [150]. In order to encrypt data, stream ciphers frequently use a keystream that is calculated from a secret key.…”
Section: Stream Cipher Methodsmentioning
confidence: 99%
“…By using the exclusive-or (XOR) function, stream ciphers combine a stream of plaintext sequences with a stream of pseudorandom cryptographic hash sequences to encrypt data. If used properly, stream ciphers can provide a robust layer of security for a wide range of communications settings, including wireless networks, the Internet, and associated transactions [150]. In order to encrypt data, stream ciphers frequently use a keystream that is calculated from a secret key.…”
Section: Stream Cipher Methodsmentioning
confidence: 99%
“…Alsamhi et al 34 The collaboration of advanced technologies can reduce life losses, save people's lives, and manage disaster crises. The network performance of collaboration between the Internet of Things (IoT) and drone edge intelligence can help gather and process data, extend the wireless coverage area, deliver medical emergencies, provide real‐time information about the emergency, and gather data from impossible areas for humans to reach.…”
Section: Related Workmentioning
confidence: 99%
“…It can be challenging to achieve a low false positive rate 27 and depends on the data the model has been employed within 2829 . it must follow some preparation procedures, and 30,31 it must be able to detect different types of attacks with an effective fault‐tolerant capacity, 32 the method is not secure, 33 the method is not able to handle the load, 34 the model not able to detect all attacks. Therefore, it is understood the existing techniques were unable to accurately identify various malware attacks and data breaches and prevent the theft of private keys.…”
Section: Related Workmentioning
confidence: 99%
“…The physical security challenges faced by IoT systems highlight the need for lightweight cryptographic algorithms and primitives that can address both resource limitations and security levels [2][3][4]. The need for lightweight ciphers featuring efficient implementations of non-linear S-boxes for practical IoT applications is discussed in [5][6][7]. The substantial factor of consideration also encompasses the desirable resistance of lightweight S-boxes to linear and differential cryptanalysis.…”
Section: Introductionmentioning
confidence: 99%