Lightweight Block and Stream Cipher Algorithm: A Review
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Yayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI)
2024-06-01
|
Series: | Journal of Applied Engineering and Technological Science |
Subjects: | |
Online Access: | https://yrpipku.com/journal/index.php/jaets/article/view/3966 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841560856301666304 |
---|---|
author | Suaad Ali Abead Nada Hussein M. Ali |
author_facet | Suaad Ali Abead Nada Hussein M. Ali |
author_sort | Suaad Ali Abead |
collection | DOAJ |
description |
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
|
format | Article |
id | doaj-art-94fa1c79804e44b490feee54c471260d |
institution | Kabale University |
issn | 2715-6087 2715-6079 |
language | English |
publishDate | 2024-06-01 |
publisher | Yayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI) |
record_format | Article |
series | Journal of Applied Engineering and Technological Science |
spelling | doaj-art-94fa1c79804e44b490feee54c471260d2025-01-03T12:32:21ZengYayasan Pendidikan Riset dan Pengembangan Intelektual (YRPI)Journal of Applied Engineering and Technological Science2715-60872715-60792024-06-015210.37385/jaets.v5i2.3966Lightweight Block and Stream Cipher Algorithm: A ReviewSuaad Ali Abead0Nada Hussein M. Ali1Department of Computer Science, College of Science for Women, University of Baghdad, Baghdad, IraqDepartment of Computer Science, College of Science, University of Baghdad Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws. https://yrpipku.com/journal/index.php/jaets/article/view/3966IoT securityLightweight encryptionBlock cipherStream cipherPrivacyIntegrity |
spellingShingle | Suaad Ali Abead Nada Hussein M. Ali Lightweight Block and Stream Cipher Algorithm: A Review Journal of Applied Engineering and Technological Science IoT security Lightweight encryption Block cipher Stream cipher Privacy Integrity |
title | Lightweight Block and Stream Cipher Algorithm: A Review |
title_full | Lightweight Block and Stream Cipher Algorithm: A Review |
title_fullStr | Lightweight Block and Stream Cipher Algorithm: A Review |
title_full_unstemmed | Lightweight Block and Stream Cipher Algorithm: A Review |
title_short | Lightweight Block and Stream Cipher Algorithm: A Review |
title_sort | lightweight block and stream cipher algorithm a review |
topic | IoT security Lightweight encryption Block cipher Stream cipher Privacy Integrity |
url | https://yrpipku.com/journal/index.php/jaets/article/view/3966 |
work_keys_str_mv | AT suaadaliabead lightweightblockandstreamcipheralgorithmareview AT nadahusseinmali lightweightblockandstreamcipheralgorithmareview |