MN502 - Overview of Network Security: Lightweight Cryptography
VerifiedAdded on 2023/04/21
|9
|2169
|366
Report
AI Summary
This report provides a comprehensive overview of lightweight cryptography, a crucial technology for securing platforms like RFID. It begins by outlining the goals of lightweight cryptography, such as collision and pre-image resistance, and then delves into potential security threats, including vulnerabilities in constrained devices, authentication issues, and challenges in managing device updates. The report then explores the working mechanisms of lightweight cryptography, detailing techniques like hashing (using SPONGENT and Quark), streaming (with PRESENT), and block ciphers (like CLEFIA). It presents software and hardware metrics and discusses various lightweight algorithms, including AES, PRESENT, and others. Finally, the report addresses current and future challenges, such as bridging the gap between industrial needs and academic solutions and the selection of key sizes. The report concludes by highlighting the growing importance of lightweight cryptography and its significance in the evolving landscape of network security.

Running head: LIGHT WEIGHT CRYPTOGRAPHY
LIGHT WEIGHT CRYPTOGRAPHY
Name of the Student
Name of the University
Author note
LIGHT WEIGHT CRYPTOGRAPHY
Name of the Student
Name of the University
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
LIGHT WEIGHT CRYPTOGRAPHY
Table of Contents
Introduction................................................................................................................ 3
Goals.......................................................................................................................... 3
Potential security threats........................................................................................... 3
Working mechanism of Light weight cryptography....................................................5
Software matrices...................................................................................................... 6
Hardware Metrics....................................................................................................... 7
Light weight algorithms.............................................................................................. 8
Current and Future Challenges................................................................................... 8
Conclusion.................................................................................................................. 9
References............................................................................................................... 10
LIGHT WEIGHT CRYPTOGRAPHY
Table of Contents
Introduction................................................................................................................ 3
Goals.......................................................................................................................... 3
Potential security threats........................................................................................... 3
Working mechanism of Light weight cryptography....................................................5
Software matrices...................................................................................................... 6
Hardware Metrics....................................................................................................... 7
Light weight algorithms.............................................................................................. 8
Current and Future Challenges................................................................................... 8
Conclusion.................................................................................................................. 9
References............................................................................................................... 10

3
LIGHT WEIGHT CRYPTOGRAPHY
Introduction
Cryptography technology has been an ever evolving technology.
Implementation of lightweight cryptography technology is used in prevention of
cyber-attacks on the platform that includes the RFID platform. Light weight
cryptography protocol is termed as the protocol that is functional in the lesser
payload. Light weight cryptography is much efficient in nature and this is the main
reason that the implementation of the Light weight cryptography over business
organizations has been increasing in rapid rate. This report will provide a goals that
are set by the Light weight cryptography during their implementation. This report
will also provide a brief security issues that might be affecting the systems that are
included in the commencement of the project. Working mechanisms of the lower
power devices that implements the Light weight cryptography. This report will also
provide a brief scenario of the challenges that are faced by the Light weight
cryptography.
Goals
The main gals of Light weight cryptography implementation are as follows: -
Collision resistant: Providing collision resistant is one of the main goal that
must be achieved by the Light weight cryptography [1].
Pre-image resistant: Pre image resistant is a major goal that is set by the
business organization from the Light weight cryptography implementation
Generation of the b bits of keys stream regarding the content of the internal
functioning of the project
Potential security threats
Potential security threats are as follows: -
Lack of secured constrained devices: In this case many systems that
implements Light weight cryptography suffer from the storage issues. The
storage that is provided in the systems that implements the Light weight
cryptography are very low. Another issue that is present in the project
management includes the fact that the commencement of the project suffers
from lack of efficiency. These system also suffers from the terminology of the
LIGHT WEIGHT CRYPTOGRAPHY
Introduction
Cryptography technology has been an ever evolving technology.
Implementation of lightweight cryptography technology is used in prevention of
cyber-attacks on the platform that includes the RFID platform. Light weight
cryptography protocol is termed as the protocol that is functional in the lesser
payload. Light weight cryptography is much efficient in nature and this is the main
reason that the implementation of the Light weight cryptography over business
organizations has been increasing in rapid rate. This report will provide a goals that
are set by the Light weight cryptography during their implementation. This report
will also provide a brief security issues that might be affecting the systems that are
included in the commencement of the project. Working mechanisms of the lower
power devices that implements the Light weight cryptography. This report will also
provide a brief scenario of the challenges that are faced by the Light weight
cryptography.
Goals
The main gals of Light weight cryptography implementation are as follows: -
Collision resistant: Providing collision resistant is one of the main goal that
must be achieved by the Light weight cryptography [1].
Pre-image resistant: Pre image resistant is a major goal that is set by the
business organization from the Light weight cryptography implementation
Generation of the b bits of keys stream regarding the content of the internal
functioning of the project
Potential security threats
Potential security threats are as follows: -
Lack of secured constrained devices: In this case many systems that
implements Light weight cryptography suffer from the storage issues. The
storage that is provided in the systems that implements the Light weight
cryptography are very low. Another issue that is present in the project
management includes the fact that the commencement of the project suffers
from lack of efficiency. These system also suffers from the terminology of the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
LIGHT WEIGHT CRYPTOGRAPHY
channel attacks. Data security issues in real time is one of the min issues that
are present in case of implementing the Light weight cryptography.
Authorization and authentication of the devices: Authorization and
authentication of the systems that are present in the commencing of the
projects are considered as a severe issue in the process of management of
the stimulation [3]. Implementation of the passwords and other
authentication policies are stated to be one of the major issue that is taken
into consideration. In case the security measures are not implemented in a
proper manner the imposters can gain access to the data that are present in
the system that uses the terminologies of Light weight cryptography. With
access to the data that are stored in the data base the main advantage that
is provided includes the fact that the data that are secured in the projection
of the management the project scope gets validated.
Managing of device updates: Systems that implements Light weight
cryptography might suffer from lack of updates. In case of lack of updates the
main disadvantage that is present includes the fact that the projection of the
safety in the systems that implement Light weight cryptography [4]. In case
the projection of the updates are not prosecuted the main advantage that is
received includes the fact that the imposters can gain access to the older
versions as the loop holes that are present in the older versions of the Light
weight cryptography are spotted and this is the main reason that the
commencing of the project. For maintaining the security aspect the updating
to the latest versions acts very important.
Working mechanism of Light weight cryptography
The working mechanism of Light weight cryptography are as follows: -
Hashing: In case of the implementation of the hashing, usage of the
SPONGENT technique is used. In case the usage of the fixed length
permutation, the main instance that is taken into consideration includes the
fact that the variable output will be performed with the help of the variable
length outputs. The entire system uses the projection of the absorbing phase,
in which the r bit inputs are treated as the X ORed. This implementation of
the X ORed terminology in the platform of the input blocks insists the fact
that the projection of the management of the function f [6]. Implementation
LIGHT WEIGHT CRYPTOGRAPHY
channel attacks. Data security issues in real time is one of the min issues that
are present in case of implementing the Light weight cryptography.
Authorization and authentication of the devices: Authorization and
authentication of the systems that are present in the commencing of the
projects are considered as a severe issue in the process of management of
the stimulation [3]. Implementation of the passwords and other
authentication policies are stated to be one of the major issue that is taken
into consideration. In case the security measures are not implemented in a
proper manner the imposters can gain access to the data that are present in
the system that uses the terminologies of Light weight cryptography. With
access to the data that are stored in the data base the main advantage that
is provided includes the fact that the data that are secured in the projection
of the management the project scope gets validated.
Managing of device updates: Systems that implements Light weight
cryptography might suffer from lack of updates. In case of lack of updates the
main disadvantage that is present includes the fact that the projection of the
safety in the systems that implement Light weight cryptography [4]. In case
the projection of the updates are not prosecuted the main advantage that is
received includes the fact that the imposters can gain access to the older
versions as the loop holes that are present in the older versions of the Light
weight cryptography are spotted and this is the main reason that the
commencing of the project. For maintaining the security aspect the updating
to the latest versions acts very important.
Working mechanism of Light weight cryptography
The working mechanism of Light weight cryptography are as follows: -
Hashing: In case of the implementation of the hashing, usage of the
SPONGENT technique is used. In case the usage of the fixed length
permutation, the main instance that is taken into consideration includes the
fact that the variable output will be performed with the help of the variable
length outputs. The entire system uses the projection of the absorbing phase,
in which the r bit inputs are treated as the X ORed. This implementation of
the X ORed terminology in the platform of the input blocks insists the fact
that the projection of the management of the function f [6]. Implementation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
LIGHT WEIGHT CRYPTOGRAPHY
of the function of insists the fact that the project prosecution gets treated in
the manner regarding the aspect of interleaving of the project management.
Quark is diversified in 3 parts, namely u-Quark, d-Quark and s-Quark.
PHOTON is the cryptographic methodology that is used for the management
of the projection of the process.
Streaming: PRESENT is considered to be the first methodology that has
implemented the projection of the smaller blocks for completion of the
allotted task. The key that are used in this technology are smaller in size. 80
bit keys are used in the prosecution of the project. 128 bit switches are also
used in this process. In this case the project management gets performed
with the help of the 16 hex characters [7]. The data that are to be processed
is entered in the system and the first 8 bit of data is EX OR with the other
remaining data. With the help of the data that are processed the main
advantage that is enjoyed in this process includes the functioning of the S-
box system.
Block: CLEFIA is considered to be a well-researched Light weight
cryptography block. The flexibility that is provided by the management of the
project are the range of key sizes regarding the project management of the
AES struggle [9]. In case the projection of the management of the large key
sizes vary and there is not much issue regarding the variation of the size.
Implementation of the 128 bit encryption is made and this is the sole reason
that the management of the project gets varied as per the management of
the required project. the terminology that is used in the commencement of
the project includes RC5/32/12/16 which is configured as the 32-bit blocks, 12
rounds and 16-byte key – 128 bits
Software matrices
Cipher RAM(bytes) FLASH(bytes)
KLEIN-80 76 1178
TWINE-80 95 1140
Piccolo-80 76 1691
SIMON(64,96) 168 1406
SPECK(64,96) 126 1391
LIGHT WEIGHT CRYPTOGRAPHY
of the function of insists the fact that the project prosecution gets treated in
the manner regarding the aspect of interleaving of the project management.
Quark is diversified in 3 parts, namely u-Quark, d-Quark and s-Quark.
PHOTON is the cryptographic methodology that is used for the management
of the projection of the process.
Streaming: PRESENT is considered to be the first methodology that has
implemented the projection of the smaller blocks for completion of the
allotted task. The key that are used in this technology are smaller in size. 80
bit keys are used in the prosecution of the project. 128 bit switches are also
used in this process. In this case the project management gets performed
with the help of the 16 hex characters [7]. The data that are to be processed
is entered in the system and the first 8 bit of data is EX OR with the other
remaining data. With the help of the data that are processed the main
advantage that is enjoyed in this process includes the functioning of the S-
box system.
Block: CLEFIA is considered to be a well-researched Light weight
cryptography block. The flexibility that is provided by the management of the
project are the range of key sizes regarding the project management of the
AES struggle [9]. In case the projection of the management of the large key
sizes vary and there is not much issue regarding the variation of the size.
Implementation of the 128 bit encryption is made and this is the sole reason
that the management of the project gets varied as per the management of
the required project. the terminology that is used in the commencement of
the project includes RC5/32/12/16 which is configured as the 32-bit blocks, 12
rounds and 16-byte key – 128 bits
Software matrices
Cipher RAM(bytes) FLASH(bytes)
KLEIN-80 76 1178
TWINE-80 95 1140
Piccolo-80 76 1691
SIMON(64,96) 168 1406
SPECK(64,96) 126 1391

6
LIGHT WEIGHT CRYPTOGRAPHY
Hardware Metrics
Light weight
cryptography
(internal) Required cryptographic hardware
Modulus-Exponent
Internal form
One of the following:
Cryptographic Coprocessor feature
PCI X Cryptographic Coprocessor
Crypto Express2 Coprocessor.
Internal form One of the following:
PCI Cryptographic Coprocessor
PCI X Cryptographic Coprocessor
Crypto Express2 Coprocessor.
Internal form One of the following:
PCI Cryptographic Coprocessor with LIC January
2005 or later, and z/OS® ICSF HCR770B or later
PCI X Cryptographic Coprocessor
Crypto Express2 Coprocessor.
Light weight algorithms
Algorithm 1: the 1st algorithm helps in understanding the aspect that the IOT
environment is well organized and this is the main reason that the projection of the
management of the terminology regarding the block cipher of AES (Rijndael) [46],
Grasshopper [53], SAFER [55], Square [57], 3-Way [52], PRESENT [54] and SHARK
[56]. Many rounds of substitution and transposition helps in better commencement
of the project. Implementation of the Shannon’s confusion helps in better
management of the project management. Inclusion of the popular ciphers helps in
the proper management of the communication of the fiestal architecture. Fiestel
LIGHT WEIGHT CRYPTOGRAPHY
Hardware Metrics
Light weight
cryptography
(internal) Required cryptographic hardware
Modulus-Exponent
Internal form
One of the following:
Cryptographic Coprocessor feature
PCI X Cryptographic Coprocessor
Crypto Express2 Coprocessor.
Internal form One of the following:
PCI Cryptographic Coprocessor
PCI X Cryptographic Coprocessor
Crypto Express2 Coprocessor.
Internal form One of the following:
PCI Cryptographic Coprocessor with LIC January
2005 or later, and z/OS® ICSF HCR770B or later
PCI X Cryptographic Coprocessor
Crypto Express2 Coprocessor.
Light weight algorithms
Algorithm 1: the 1st algorithm helps in understanding the aspect that the IOT
environment is well organized and this is the main reason that the projection of the
management of the terminology regarding the block cipher of AES (Rijndael) [46],
Grasshopper [53], SAFER [55], Square [57], 3-Way [52], PRESENT [54] and SHARK
[56]. Many rounds of substitution and transposition helps in better commencement
of the project. Implementation of the Shannon’s confusion helps in better
management of the project management. Inclusion of the popular ciphers helps in
the proper management of the communication of the fiestal architecture. Fiestel
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7
LIGHT WEIGHT CRYPTOGRAPHY
architecture helps in encryption and decryption of the project includes the fact that
the commencement of the entire project gets performed in a better manner.
Algorithm 2: In the first step, 64 bit cipher key is used. The 64 bit cipher key
is diversified in many 4 bit segments. The f function that acts as the modulator
functions on the 16 bit data. The 16 bit functioning is performed with the help of the
substitution method. The next step includes he projection of the 16 bit to the
function by passing the 16 bits [9]. The f function mainly consists of the linear and
non-linear transformation which results in the confusion and diffusion of the project.
XOR operation is performed in order to get the project performed in 4 round keys
and the project management is performed with the help of the fifth key.
Current and Future Challenges
Current and Future challenges are as follows: -
Bridging the gap in between the industrial need and the academic
solution is a challenging aspect
Communicating with the industries in order to have a better
understanding of the projects acts as challenges for the light weight
cryptography
Flexibility of the entire project acts as one of the major reason for the
commencement of the project.
Selection of the key size is one of the most important challenge that can
be taken into consideration
Conclusion
From the above discussion it can be stated that Lightweight cryptography has
been gaining importance globally. Lightweight algorithms have been stated in many
occasions and the proposition of the algorithms are well verified. LED, PRESENT,
KANTAN and CLEFIA are few popular algorithms of Lightweight cryptography. This
report also provides a brief understanding of the challenges that are present in the
commencement of the project with the help of the Lightweight cryptography
protocols. Performance matrices are also provided in this report. This report also
helps in better management of different projects that uses Lightweight
cryptography.
LIGHT WEIGHT CRYPTOGRAPHY
architecture helps in encryption and decryption of the project includes the fact that
the commencement of the entire project gets performed in a better manner.
Algorithm 2: In the first step, 64 bit cipher key is used. The 64 bit cipher key
is diversified in many 4 bit segments. The f function that acts as the modulator
functions on the 16 bit data. The 16 bit functioning is performed with the help of the
substitution method. The next step includes he projection of the 16 bit to the
function by passing the 16 bits [9]. The f function mainly consists of the linear and
non-linear transformation which results in the confusion and diffusion of the project.
XOR operation is performed in order to get the project performed in 4 round keys
and the project management is performed with the help of the fifth key.
Current and Future Challenges
Current and Future challenges are as follows: -
Bridging the gap in between the industrial need and the academic
solution is a challenging aspect
Communicating with the industries in order to have a better
understanding of the projects acts as challenges for the light weight
cryptography
Flexibility of the entire project acts as one of the major reason for the
commencement of the project.
Selection of the key size is one of the most important challenge that can
be taken into consideration
Conclusion
From the above discussion it can be stated that Lightweight cryptography has
been gaining importance globally. Lightweight algorithms have been stated in many
occasions and the proposition of the algorithms are well verified. LED, PRESENT,
KANTAN and CLEFIA are few popular algorithms of Lightweight cryptography. This
report also provides a brief understanding of the challenges that are present in the
commencement of the project with the help of the Lightweight cryptography
protocols. Performance matrices are also provided in this report. This report also
helps in better management of different projects that uses Lightweight
cryptography.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8
LIGHT WEIGHT CRYPTOGRAPHY
LIGHT WEIGHT CRYPTOGRAPHY

9
LIGHT WEIGHT CRYPTOGRAPHY
References
[1]A. Arun and P. Kumar, "SOPC BASED WIRELESS REMOTE PATIENT MONITORING
USING ULTRA LIGHTWEIGHT CRYPTOGRAPHY", Journal of Computer Science, vol. 10,
no. 10, pp. 1924-1928, 2014. Available: 10.3844/jcssp.2014.1924.1928.
[2]Y. Liu, H. Yan and C. Liu, "A class of six-weight cyclic codes and their weight
distribution", Designs, Codes and Cryptography, vol. 77, no. 1, pp. 1-9, 2014.
Available: 10.1007/s10623-014-9984-y.
[3]M. Sri Lakshmi and V. Srikanth, "A Study on Light Weight Cryptography
Algorithms for Data Security in IOT", International Journal of Engineering &
Technology, vol. 7, no. 27, p. 887, 2018. Available: 10.14419/ijet.v7i2.7.11088.
[4]Y. Liu and H. Yan, "A class of five-weight cyclic codes and their weight
distribution", Designs, Codes and Cryptography, vol. 79, no. 2, pp. 353-366, 2015.
Available: 10.1007/s10623-015-0056-8.
[5]D. MS, G. H L and R. B, "Cryptography Based Light-Weight Attribute Encryption
Scheme for Internet of Things", International Journal of Engineering and Applied
Computer Science, vol. 02, no. 05, pp. 160-164, 2017. Available:
10.24032/ijeacs/0205/03.
[6]C. Baskar, C. Balasubramaniyan and D. Manivannan, "Establishment of Light
Weight Cryptography for Resource Constraint Environment Using FPGA", Procedia
Computer Science, vol. 78, pp. 165-171, 2016. Available:
10.1016/j.procs.2016.02.027.
[7]B. Skuse, "Security heads for the light [photonic cryptography]", Engineering &
Technology, vol. 11, no. 10, pp. 54-57, 2016. Available: 10.1049/et.2016.1004.
[8]G. Hatzivasilis, "Password-Hashing Status", Cryptography, vol. 1, no. 2, p. 10,
2017. Available: 10.3390/cryptography1020010.
[9]P. Wani, R. Shah, S. Para and P. Bhat, "Comparison of Outcome between Light
weight Mesh & Heavy Weight Mesh in Lichtenstein Groin Hernia Repair", Journal of
Medical Science And clinical Research, 2015. Available: 10.18535/jmscr/v3i8.40.
LIGHT WEIGHT CRYPTOGRAPHY
References
[1]A. Arun and P. Kumar, "SOPC BASED WIRELESS REMOTE PATIENT MONITORING
USING ULTRA LIGHTWEIGHT CRYPTOGRAPHY", Journal of Computer Science, vol. 10,
no. 10, pp. 1924-1928, 2014. Available: 10.3844/jcssp.2014.1924.1928.
[2]Y. Liu, H. Yan and C. Liu, "A class of six-weight cyclic codes and their weight
distribution", Designs, Codes and Cryptography, vol. 77, no. 1, pp. 1-9, 2014.
Available: 10.1007/s10623-014-9984-y.
[3]M. Sri Lakshmi and V. Srikanth, "A Study on Light Weight Cryptography
Algorithms for Data Security in IOT", International Journal of Engineering &
Technology, vol. 7, no. 27, p. 887, 2018. Available: 10.14419/ijet.v7i2.7.11088.
[4]Y. Liu and H. Yan, "A class of five-weight cyclic codes and their weight
distribution", Designs, Codes and Cryptography, vol. 79, no. 2, pp. 353-366, 2015.
Available: 10.1007/s10623-015-0056-8.
[5]D. MS, G. H L and R. B, "Cryptography Based Light-Weight Attribute Encryption
Scheme for Internet of Things", International Journal of Engineering and Applied
Computer Science, vol. 02, no. 05, pp. 160-164, 2017. Available:
10.24032/ijeacs/0205/03.
[6]C. Baskar, C. Balasubramaniyan and D. Manivannan, "Establishment of Light
Weight Cryptography for Resource Constraint Environment Using FPGA", Procedia
Computer Science, vol. 78, pp. 165-171, 2016. Available:
10.1016/j.procs.2016.02.027.
[7]B. Skuse, "Security heads for the light [photonic cryptography]", Engineering &
Technology, vol. 11, no. 10, pp. 54-57, 2016. Available: 10.1049/et.2016.1004.
[8]G. Hatzivasilis, "Password-Hashing Status", Cryptography, vol. 1, no. 2, p. 10,
2017. Available: 10.3390/cryptography1020010.
[9]P. Wani, R. Shah, S. Para and P. Bhat, "Comparison of Outcome between Light
weight Mesh & Heavy Weight Mesh in Lichtenstein Groin Hernia Repair", Journal of
Medical Science And clinical Research, 2015. Available: 10.18535/jmscr/v3i8.40.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.