Lightweight Block and Stream Cipher Algorithm: A Review

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of...

Full description

Saved in:
Bibliographic Details
Main Authors: Suaad Ali Abead, Nada Hussein M. Ali
Format: Article
Language:English
Published: Yayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI) 2024-06-01
Series:Journal of Applied Engineering and Technological Science
Subjects:
Online Access:https://yrpipku.com/journal/index.php/jaets/article/view/3966
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841560856301666304
author Suaad Ali Abead
Nada Hussein M. Ali
author_facet Suaad Ali Abead
Nada Hussein M. Ali
author_sort Suaad Ali Abead
collection DOAJ
description Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
format Article
id doaj-art-94fa1c79804e44b490feee54c471260d
institution Kabale University
issn 2715-6087
2715-6079
language English
publishDate 2024-06-01
publisher Yayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI)
record_format Article
series Journal of Applied Engineering and Technological Science
spelling doaj-art-94fa1c79804e44b490feee54c471260d2025-01-03T12:32:21ZengYayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI)Journal of Applied Engineering and Technological Science2715-60872715-60792024-06-015210.37385/jaets.v5i2.3966Lightweight Block and Stream Cipher Algorithm: A ReviewSuaad Ali Abead0Nada Hussein M. Ali1Department of Computer Science, College of Science for Women, University of Baghdad, Baghdad, IraqDepartment of Computer Science, College of Science, University of Baghdad Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws. https://yrpipku.com/journal/index.php/jaets/article/view/3966IoT securityLightweight encryptionBlock cipherStream cipherPrivacyIntegrity
spellingShingle Suaad Ali Abead
Nada Hussein M. Ali
Lightweight Block and Stream Cipher Algorithm: A Review
Journal of Applied Engineering and Technological Science
IoT security
Lightweight encryption
Block cipher
Stream cipher
Privacy
Integrity
title Lightweight Block and Stream Cipher Algorithm: A Review
title_full Lightweight Block and Stream Cipher Algorithm: A Review
title_fullStr Lightweight Block and Stream Cipher Algorithm: A Review
title_full_unstemmed Lightweight Block and Stream Cipher Algorithm: A Review
title_short Lightweight Block and Stream Cipher Algorithm: A Review
title_sort lightweight block and stream cipher algorithm a review
topic IoT security
Lightweight encryption
Block cipher
Stream cipher
Privacy
Integrity
url https://yrpipku.com/journal/index.php/jaets/article/view/3966
work_keys_str_mv AT suaadaliabead lightweightblockandstreamcipheralgorithmareview
AT nadahusseinmali lightweightblockandstreamcipheralgorithmareview