Light Weight Cryptography Research Topics
Light Weight Cryptography (LWC) works based on cryptographic algorithm, which is specifically designed for working in Resource-constrained devices. You can learn more and gain better knowledge on this topic LWC by completely reading this research paper.
- Define Lightweight Cryptography
The LWC is nothing but cryptographic algorithms which is mainly designed to concentrate working on environment which has minimum resources like Internet of Things (IoT), embedded system or any other platforms operating on low power. This system can provide high level of security with minimum energy and memory requirements. The idea behind this technique is that, it can produce maximum security of system with the help of limited resources and the implementation process is also simple.
- What is Lightweight Cryptography?
This LWC is functioning on the basis of cryptographic algorithm. This was designed to operate with low memory, power and minimum resources. This system is widely used by RFID tags, sensor nodes and some other systems with less processing capabilities.
- Where Lightweight Cryptography is used?
In this section we are going to discuss about the uses of LWC. This is one of the latest and current techniques build on top of the cryptographic protocols or algorithms. This system is mainly designed in order to work in environments such as, healthcare devices, embedded systems, contactless cards, RFID tags and sensors.
- Why Lightweight Cryptography is proposed? Previous technology issues
Moving on to the next section, here we are going to discuss about the challenges faced by this LWC technology. This system handles too much amount of data with Blockchain technology because of which it faces many challenges. The existing system faces challenges like analyzing attack and encrypting data also in not effectively transmitting data. Some of the other issues are explained below:
Challenges in Blockchain based Resource Management: The “Blockchain-Based Resource Management Algorithm” (B-RMA) which is used in earlier systems increases latency and reduces throughput, this creates problem in real-time operation. By analyzing all the encryption process and utilizing total key length will reduce the memory and resource requirement.
High Computational Complexity: The earlier technology uses Encryption Algorithm (EA) has some limitations in the process of decryption and it was also complex. Moreover this process of cryptanalysis needs more memory to store resources and to manipulate the outcomes and potential keys.
Impact of Side-channel analysis: In the previous design it takes more time for executing in read operations. It was also little lacking in security analysis and poor performance because of using Encryption Algorithm.
- Algorithms / Protocols
After knowing about the technology, uses of it and the issues faced by them in the earlier stage, now we are going to learn about the algorithms used for this technology. The algorithms provided for LWC to overcome the previous issues faced by it are: “Harmonic ByzRaft-PoA Fusion”, “Lightweight Elliptic Curve Cryptography” (LECC), “Lightweight Reed-Solomon” (LRS) erasure code, “Lightweight Elliptic Curve Secure Key Exchange and Authentication” (LECSKEA), Keccak (SHA-3) and “Quantum Key Distribution” (QKD).
- Simulation results / Parameters
The approaches which were proposed to overcome the issues faced by LWC in the above section are tested using different methodologies to analyze its performance. The comparison is done by using metrics like “Block size (transactions) vs. Total storage overhead (mb)”, “Data size vs. Decryption time (ms)”, “Data size vs. Encryption time (ms)”, “Number of nodes vs. Recovery latency (ms)” and “Time (ms) vs. Transaction per second”.
- Dataset LINKS / Important URL
Here are some of the links provided for you below to gain more knowledge about LWC which can be useful for you:
- https://doi.org/10.1016/j.dcan.2022.03.020
- https://doi.org/10.3390/s22114269
- https://doi.org/10.1016/j.future.2022.11.007
- https://doi.org/10.3390/e25070986
- Lightweight Cryptography Applications
In this next section we are going to discuss about the applications of LWC technology. It is a method in the branch of encryption, which has a main motive of providing privacy and security for applications with resource constrains. This method can be applied in areas like embedded systems, physical cyber systems, IoT devices, system of Radio Frequency Identification (RDFI), Ad-hoc networks in vehicle, healthcare and Wireless Sensor Networks (WSN).
- Topology
Topology is generally architecture of a network. Here in this topic, topology for LWC has a Blockchain network, which is structured to fit some of the requirements needed by the resource-constrained environment.
- Environment
For the functioning of this system LWC by analyzing the protocols of Blockchain in a resource-constrained system, there should be some environment considerations like Communication Channels, Scalability Considerations, Energy Efficiency, Requirements for Transaction Throughput, Security Threats and management challenges.
- Simulation Tools
Here we provide some simulation software for LWC, which is established with the usage of tools like Python version 3.11.4 along with Network simulator version 3.26 or above.
- Results
After going through this research based on LWC Technology, you can understand in detail about this technology, applications of this technology, different topologies of it, algorithms followed by it also about the limitations and how it can be overcome.
Light Weight Cryptography Research Ideas
- Lightweight Cryptography Concepts and Algorithms: A Survey
- Feasibility Study of Improving Blockchain-Based Self-Sovereign Identity Security using Artificial Intelligence and Lightweight Cryptography
- Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks
- A Hardware Architecture of NIST Lightweight Cryptography Applied in IPsec to Secure High-Throughput Low-Latency IoT Networks
- Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABE
- A Review on FPGA Implementation of Lightweight Cryptography for Wireless Sensor Network
- Performance and Energy Evaluation of Lightweight Cryptography for Small IoT Devices
- Techniques for Resource-Efficient, Lightweight Cryptography in IoT Devices for Smart Environment
- Assessment of Lightweight Cryptography Algorithms on ARM Cortex-M Processors
- Assessment of Radiation-Induced Soft Errors on Lightweight Cryptography Algorithms Running on a Resource-Constrained Device
- Hybrid Authentication System of Face Mask Detection Using CNN-based on Lightweight Cryptography and Blockchain Technology
- A Lightweight Image Cryptography Approach via Invertible Transformation
- Deep Learning Techniques Using Lightweight Cryptography for IoT Based E-Healthcare System
- Lightweight quantum-safe cryptography in underwater scenarios
- VLSI implementation of lightweight cryptography technique for FPGA-IOT application
- A novel 5-bit S-box design for lightweight cryptography algorithms
- LSBlocFL: A secure federated learning model combining Blockchain and lightweight cryptographic solutions
- Retraction notice to “Cloud Data Security Mechanism using the Lightweight Cryptography” Optik 271 (2022) 170084]
- Embedded Light-Weight Cryptography Technique to Preserve Privacy of Healthcare Wearable IoT Device Data
- A Review on Lightweight Cryptographic algorithms in Internet of Things
- Secure and Scalable Internet of Medical Things using Ensemble Lightweight Cryptographic Model
- Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things
- Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK
- Review of the NIST Light-Weight Cryptography Finalists
- Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey
- Lightweight cryptographic secure random number generator for IoT devices
- Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers
- A Survey of Efficient Light Weight Cryptography Algorithm for Internet of Medical Things
- Exploring the Viability and Effectiveness of Lightweight Cryptographic Techniques in Enhancing the IoT Data Security of Smart Cities
- Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks
- A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things
- An extended analytical framework for heterogeneous implementations of light cryptographic algorithms
- A design of lightweight ECC based cryptographic algorithm coupled with linear congruential method for resource constraint area in IoT
- Hardware and Energy Efficiency Evaluation of NIST Lightweight Cryptography Standardization Finalists
- Implementation of Lightweight Cryptography Core PRESENT and DM-PRESENT on FPGA
- Quick Analysis of the NIST Lightweight Cryptography Standardization Process Finalists
- Energy Efficiency Enhancement of Parallelized Implementation of NIST Lightweight Cryptography Standardization Finalists
- S-Box Attack Using FPGA Reverse Engineering for Lightweight Cryptography
- A Survey on Lightweight Cryptography Approach for IoT Devices Security
- Robust Reversible Watermarking in Encrypted Image with Secure Multi-Party Based on Lightweight Cryptography
- towards an Optimal Security Using Multifactor Scalable Lightweight Cryptography for IoT
- Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and Opportunities
- Substitution Layer Analysis of NIST Lightweight Cryptography Competition Finalists
- Design and Implementation of a Lightweight Cryptographic Module, for Wireless 5G Communications and Beyond
- Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
- Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms
- Light Weight Cryptography for Cloud-Based E-Health Records
- Blockchain meets lightweight cryptography
- Lightweight Cryptography Approach for Multifactor Authentication in Internet of Things
- A Lightweight Cryptographic Algorithm with a Multi-Purpose Encipher Key for IoT