{"id":211,"date":"2023-09-15T14:56:13","date_gmt":"2023-09-15T20:56:13","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=211"},"modified":"2023-09-15T15:10:23","modified_gmt":"2023-09-15T21:10:23","slug":"lightweight-cryptography-the-go-to-cryptography-for-iot-security","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/09\/15\/lightweight-cryptography-the-go-to-cryptography-for-iot-security\/","title":{"rendered":"Lightweight Cryptography: The go-to Cryptography for IoT Security\u00a0"},"content":{"rendered":"\n<p>Charles Odunaiya, Dev Patel, Harsh Patel, Nina Onwuachi, Saniya Jabir<\/p>\n\n\n\n<p><strong>Internet of Things (IoT) <\/strong>\u00a0<\/p>\n\n\n\n<p>Buzzwords like Smart cities, Smart homes, and Smart Wearables have recently gained popularity on all fronts, both on social media and traditional platforms. The technical description of these words is the Internet of Things (IoT). According to Thakor et al. (2021), IoT is a network of connected devices, each with unique identification, able to collect and exchange data over the Internet with or without human interaction.&nbsp;<\/p>\n\n\n\n<p><strong>What is Cryptography? <\/strong>&nbsp;<\/p>\n\n\n\n<p>Cryptography is a method used to safeguard information and communications by encoding them with codes, ensuring that only individuals for whom the information intends to understand and utilize it, preventing unauthorized access to it.&nbsp;<\/p>\n\n\n\n<p>Cryptography relies on mathematical algorithms to protect information by transforming messages in a way that makes decoding difficult. They are also vital for secure online activities like browsing and safeguarding sensitive transactions (credit card information). (Follow, 2019).&nbsp;<\/p>\n\n\n\n<p>Some Cryptographic algorithms:&nbsp;<\/p>\n\n\n\n<p>Advanced Encryption Standard (AES):&nbsp;AES is the most widely adopted Cybersecurity algorithm. AES is a symmetric key encryption algorithm (encryption and decryption uses the same for their respective operation). Its swiftness and robust security features position AES as the go-to choice for instant messaging applications like WhatsApp and Signal.&nbsp;<\/p>\n\n\n\n<p>It works on fixed-size data (128 bits) and uses a key of variable size (128, 192, or 256 bits), which does a series of computations called rounds (10, 12, or 14 rounds depending on the key size) like Sub Bytes, Shift Rows, Mix Columns, and Add RoundKey.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Secure Hash Algorithm (SHA):&nbsp;SHA is a family of cryptographic functions designed to keep data secured. SHA produces a fixed-size string (the hash value that looks nothing like the original). A few algorithms of interest are SHA-1, SHA-2, and SHA-3, each of which was successively designed with increasingly more robust encryption in response to hacker attacks. SHA-0, for example, is now obsolete due to the widely exposed vulnerabilities.&nbsp;<\/p>\n\n\n\n<p><strong>What is Conventional Cryptography?<\/strong>&nbsp;<\/p>\n\n\n\n<p>Conventionally in cryptography, resources like memory, computation power, battery power, etc., have often been taken for granted as modern hardware for widely used devices like PCs, Servers, and mobile phones have enough of these resources to run the algorithms.&nbsp; &nbsp;<\/p>\n\n\n\n<p>In Conventional Cryptography, the same secret key is used to Encrypt and Decrypt the message.&nbsp;<\/p>\n\n\n\n<p>Back then, it was the only encryption method used before the development of public-key encryption. It processes quickly because it uses a single key for encryption and decryption.&nbsp;<\/p>\n\n\n\n<p>Assuming Alice wants to send a message to Bob (plaintext). Alice encrypted the plaintext using an algorithm and a secret key to prevent hackers from reading the message. This encrypted plaintext is called Ciphertext. Using the same secret key and encryption algorithm run in reverse, Bob can get the message from Alice, and thus, the message is read only by Bob, and security is maintained.&nbsp; &nbsp;<\/p>\n\n\n\n<p>The idea used in this technique is old, and that is why this model is called conventional encryption.&nbsp;<\/p>\n\n\n\n<p>Advantages of using Conventional Cryptography:&nbsp;<\/p>\n\n\n\n<p>1. Simple&nbsp;<\/p>\n\n\n\n<p>2. Fast&nbsp;<\/p>\n\n\n\n<p>3. Uses less computer resources\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-medium is-resized\"><img decoding=\"async\" data-id=\"225\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-5-268x300.jpeg\" alt=\"\" class=\"wp-image-225 lazyload\" style=\"--smush-placeholder-width: 453px; --smush-placeholder-aspect-ratio: 453\/453;object-fit:cover;width:453px;height:453px\" width=\"453\" height=\"453\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n<\/figure>\n\n\n\n<p>A new frontier has recently opened for computing devices, i.e., IoT<\/p>\n\n\n\n<p>IoT devices are meant to have a small surface area, fast and narrow in their abilities. This feature also means that much data will be transferred through the networks, which must be secured.&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-2.png\" alt=\"\" class=\"wp-image-212 lazyload\" style=\"--smush-placeholder-width: 453px; --smush-placeholder-aspect-ratio: 453\/453;width:453px;height:453px\" width=\"453\" height=\"453\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-2.png 474w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-2-300x300.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-2-150x150.png 150w\" data-sizes=\"(max-width: 453px) 100vw, 453px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n\n\n\n<p>Well, we very quickly realized that the IoT devices needed algorithms that used less resources like processing, storage and power and were faster to facilitate the real-time aspect of IoT devices. Here is where a new area of Cryptography, aptly named Lightweight Cryptography (LWC), emerged.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"508\" height=\"499\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-4.jpeg\" alt=\"\" class=\"wp-image-213 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-4.jpeg 508w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/09\/image-4-300x295.jpeg 300w\" data-sizes=\"(max-width: 508px) 100vw, 508px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 508px; --smush-placeholder-aspect-ratio: 508\/499;\" \/><\/figure>\n\n\n\n<p><strong>What is Lightweight Cryptography (LWC)?<\/strong>&nbsp;<\/p>\n\n\n\n<p>Lightweight Cryptography is an encryption method used by small devices with low computational capabilities. It aims to expand cryptography applications to constrained devices and its related international standardization and guidelines.&nbsp;<\/p>\n\n\n\n<p>The main factors to take into consideration for LWC are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Size (RAM \/ ROM sizes, circuit size) is related to small devices like RFID tags, Sensors, smart cards, etc.&nbsp;<\/li>\n\n\n\n<li>Power &#8211; is essential with RFID and energy-harvesting devices&nbsp;<\/li>\n\n\n\n<li>Power consumption &#8211; is vital with battery-driven devices.&nbsp;<\/li>\n\n\n\n<li>Processing speed (throughput\/ latency)&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Examples of Lightweight Cryptography Algorithms:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AES &nbsp;<\/li>\n\n\n\n<li>PRESENT&nbsp;<\/li>\n\n\n\n<li>GIFT&nbsp;<\/li>\n\n\n\n<li>SKINNY &nbsp;<\/li>\n\n\n\n<li>TWINE&nbsp;<\/li>\n\n\n\n<li>MCRYPTON &nbsp;<\/li>\n\n\n\n<li>ICEBERG &nbsp;<\/li>\n\n\n\n<li>PUFFIN-2, etc.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Why choose LWC over conventional for IoT? <\/strong>&nbsp;<\/p>\n\n\n\n<p>Lightweight Cryptography (LWC) is noteworthy due to its speed and solid protective strategies, establishing it as a logical option for a multitude of reasons:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Resource Efficiency: LWC is recognized for its resource conservancy, conceived with the limited computational capacities of IoT gadgets in consideration. It spares the device&#8217;s memory bandwidth, endorsing smoother operations without immersing in complicated cryptographic procedures (Jadhav et al., 2020).&nbsp;<\/li>\n\n\n\n<li>Speed and Flexibility: LWC facilitates swifter data manipulation and interaction, which is indispensable for the instantaneous requirements of IoT devices. Its versatility facilitates smoother integration with varied IoT frameworks, presenting adjustable security tiers, which is beneficial (Alkhudhayr et al., 2021).&nbsp;<\/li>\n\n\n\n<li>Cost-Effectiveness: Choosing LWC can markedly diminish expenses related to defending an IoT infrastructure due to its lesser computational requisites. It is a financially wise alternative for protecting diverse IoT setups (Thakor et al., 2021).&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Embracing LWC guarantees advanced protection while encouraging efficiency and adaptability, paving the pathway for a more secure and forward-thinking IoT environment.&nbsp;<\/p>\n\n\n\n<p><strong>Shortcomings of LWC<\/strong>&nbsp;<\/p>\n\n\n\n<p>Despite being able to utilize far fewer resources, power, and space, Kanagachidambaresan (2020) suggests that LWC has three significant challenges:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Challenges in Hardware Implementation: When implementing any hardware solution, hardware components should be preserved. In LWC, they are scaled down.&nbsp;<\/li>\n\n\n\n<li>Challenges in Software Implementation: For Software implementations, implementation size, memory consumption, and code execution speed are always better in conventional Cryptography as compared to Lightweight Cryptography.&nbsp;<\/li>\n\n\n\n<li>Challenges in Design: AES, considered the fastest and most secure of existing encryption algorithms, requires a 128-bit block and 128-bit key. However, LWC only uses a 64-bit block. (WAIT PLS)&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Conclusion<\/strong>&nbsp;<\/p>\n\n\n\n<p>IoT is here to stay; it will eventually outnumber the number of humans on Earth. However, this increases vulnerability and raises security and data privacy issues. Of course, until we have a Cryptographic algorithm that is secure, fast, and extremely lightweight.&nbsp;<\/p>\n\n\n\n<p class=\"has-small-font-size\"><br>Thanks for stopping by!<br>If you enjoyed reading this blog, please leave a comment and or question. <br><br><\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Alkhudhayr, F., Moulahi, T., &amp; Alabdulatif, A. (2021). Evaluation study of elliptic curve cryptography scalar multiplication on raspberry PI4.      International Journal of Advanced Computer Science and Applications, 12(9). https:\/\/doi.org\/10.14569\/ijacsa.2021.0120954<\/p>\n\n\n\n<p>Follow, J. (2019, July 8). Cryptography and its types. GeeksforGeeks. https:\/\/www.geeksforgeeks.org\/cryptography-and-its-types<\/p>\n\n\n\n<p>Jadhav, S. P., Balabanov, G., Poulkov, V., &amp; Shaikh, J. R. (2020). Enhancing the security and efficiency of resource constraint devices in IOT. 2020 International Conference on Industry 4.0 Technology (I4Tech). https:\/\/doi.org\/10.1109\/i4tech48345.2020.9102639<\/p>\n\n\n\n<p>Follow, A. (2021, January 4). Conventional encryption. GeeksforGeeks. https:\/\/www.geeksforgeeks.org\/conventional-encryption\/<\/p>\n\n\n\n<p>Kanagachidambaresan, G. R. (2020). Lightweight Cryptography Algorithms for IoT Resource-Starving Devices. In Role of Edge Analytics in Sustainable Smart City Development (pp. 139\u2013169). John Wiley &amp; Sons, Incorporated. https:\/\/doi.org\/10.1002\/9781119681328.ch8<\/p>\n\n\n\n<p>Okamura, T., (2017). Lightweight cryptography applicable to various IoT devices: NEC technical journal. (n.d.). NEC. Retrieved September 13, 2023, from https:\/\/www.nec.com\/en\/global\/techrep\/journal\/g17\/n01\/170114.html<\/p>\n\n\n\n<p>Secure Hash Algorithms. (n.d.). Brilliant.org. Retrieved September 14, 2023, from https:\/\/brilliant.org\/wiki\/secure-hashing-algorithms\/<\/p>\n\n\n\n<p>Thakor, V. A., Razzaque, M. A., &amp; Khandaker, M. R. A. (2021). Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. IEEE Access, 9, 28177\u201328193. https:\/\/doi.org\/10.1109\/ACCESS.2021.3052867<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Charles Odunaiya, Dev Patel, Harsh Patel, Nina Onwuachi, Saniya Jabir Internet of Things (IoT) \u00a0 Buzzwords like Smart cities, Smart homes, and Smart Wearables have recently gained popularity on all fronts, both on social media and traditional platforms. The technical description of these words is the Internet of Things (IoT). According to Thakor et al. &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/09\/15\/lightweight-cryptography-the-go-to-cryptography-for-iot-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Lightweight Cryptography: The go-to Cryptography for IoT Security\u00a0&#8220;<\/span><\/a><\/p>\n","protected":false},"author":616,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-211","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Charles Odunaiya","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/charles-odunaiya\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/616"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=211"}],"version-history":[{"count":7,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/211\/revisions"}],"predecessor-version":[{"id":227,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/211\/revisions\/227"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}