2
2
https://www.scirp.org/journal/ait
ISSN Online: 2161-6825
ISSN Print: 2161-6817
Keywords
Internet of Things, Lightweight Cryptographic Scheme, Vectorial Boolean
Functions, IoT Differential Cryptanalysis
1. Introduction
Data security is an important issue in any wireless cryptographic protocol; a cryp-
tographic algorithm is an essential part of network security. One of the break-
through techniques is “Lightweight Cryptography (LWC)”. A lightweight cryp-
tographic scheme is suitable for implementation in resource-constrained envi-
ronments such as RFID, sensor networks, healthcare, IoT, cyber-physical sys-
tems, distributed control systems, indicators, meters, custom controls, smart
energy systems, etc. [1]. However, most of the above IoT devices suffer from
many limitations. They are resource-poor devices with limited computing pow-
er, battery (lifetime), memory, and computational speed. Therefore, a lot of at-
tention needs to be paid to these devices, especially when it comes to data
processing. The huge amount of data exchanged between all nodes in wireless
networks brings new risks and more challenges. One of them is the limitation of
resources (e.g., energy), and many other combinations of factors suffer from fi-
nancial constraints. However, the share of resources devoted to security is very
small and represents only a fraction of the total resources available.
The structure of the paper is as follows: Section 2 discusses different types of
cryptographic techniques. Section 3 briefly surveys various examples in the text
that illustrate lightweight cryptographic algorithms for IoT. This paper should
not consider as a comprehensive history of cryptology or the algorithms them-
selves, but rather a focused review on lightweight cryptography for IoT. Section
4 begins with a history of the notion of Boolean functions history, which at-
tempts to illustrate their importance in the particular building blocks of symme-
tric cryptographic systems modern block ciphers, and also provides review in-
cludes cryptanalysis of Boolean functions. Finally Section 5 concludes the work.
ified versions of the well-known DES). The main idea of the new variants of DES
is to use just one S-box recursively, instead of eight different S-boxes in order to
minimize the hardware implementation.
A study in [3] presented PRINCE in 2012, which provides a new dimension to
lightweight cryptography by achieving low latency. It also focuses on hardware
implementation. It utilized 128 bits key and comprised of 64 bits block with 12
rounds. The S-box of this cipher was non-linear i.e. it used Feistel structure. The
main advantage of the Feistel structure is that the same program code can be
used for the encryption and decryption process. It also helps in reducing the
usage of memory. Unfortunately the cipher can be susceptible to related-key at-
tacks if the Feistel structure utilizes alternating keys. Some other lightweight
cryptographic schemes noteworthy to mention from this generation are Hum-
ming-Bird, KASUMI, and Piccolo.
A study in [4] have shown a simple, lightweight block cipher, SIMON, and
SPECK in 2015 that performs on heterogeneous platforms with ease due to its
inherent simplicity.
In [5] was presented in 2015. Notably is appropriate for RFID tags and WSN
etc. The main idea in the design of Simeck is use of a slightly simplified version
of the round function of Simon by changing shift numbers in order to realize an
acceptable trade-off between hardware performance and security.
In [6], the authors proposed lightweight design choices for LED-like block ci-
phers. In this work, 4 × 4 Serial matrices are preferred choice for building diffu-
sion layers of lightweight block ciphers in order to satisfy the optimization of a
reduced area in hardware designs.
In a study [7], authors elaborated on various aspects of lightweight crypto-
graphy (LWC). The authors purposed a lightweight hybrid algorithm for IoT
devices. It tells which LWC algorithm should be used on a specific device. This
decision is made on the basis of memory storage, and power of the device along-
side the computational power required for the LWC algorithm. This article cov-
ered the timeline until 2016.
In [8], authors proposed a simplified new version of the round function of the
original Simon by reducing its impact by changing the shift numbers, so the first
rotation is removed in order to enhance the speed of SIMON and execution
time.
In [9], authors proposed a new and robust version of the original XXTEA by
employing an improved S-box in order to enhance security to overcome such
key-related and chosen-plaintext attacks.
Based on the literature survey conducted, some lightweight symmetric algo-
rithms are mentioned on the basis of block size, key size, structure, and the num-
ber of rounds.
Generally, a significant amount of focus in LWC has been on design of the
S-box to match execution speed, code size, low energy consumption and resis-
tance to attack.
[14] laid the foundation for the development of modern digital computer cir-
cuits. Claude Shannon (1916-2001) was a gifted electrical engineer and mathe-
matician. Claude worked on his mathematical theory of communications at the
Advanced Study Institute in Princeton in 1940-41. During the world war years
he worked at Bell Labs on fire control; he continued his work on communica-
tions and also on cryptography. Based on his nascent communication theory, he
created a mathematical foundation for cryptography in 1945.
5. Conclusions
A number of studies related to the design of lightweight cryptographic schemes
have been reviewed. A brief history of Boolean function has been expressed, for
shedding light on this function’s progress and applications. The role of Boolean
function in lightweight cryptography has been recognized with accompanying
application to IoT.
Future application opportunities for Boolean function in IoT are expected to
increase as demonstrated recently and used in a wide area. Table 1 compares the
system parameters for the schemes reviewed. Apparently, the size of the key and
cryptographic architectures are determinants for the processing times. The per-
formance of lightweight cryptographic schemes is provided as a guide in the
choice of application for chosen IoT devices and networks.
Acknowledgements
We thank Prof. Johnson Ihyeh Agbinya for his contributions for many useful
comments and his encouraging this work.
Conflicts of Interest
The authors declare no conflicts of interest regarding the publication of this pa-
per.
References
[1] Kiran Kumar, V.G., Mascarenhas, S.J., Kumar, S. and Viven Rakesh, J.P. (2015) De-
sign and Implementation of Tiny Encryption Algorithm. Journal of Engineering
Research and Applications, 94-97. http://academia.edu
[2] Leander, G., Paar, C., Poschmann, A. and Schramm, K. (2007) New Lightweight
DES Variants. 14th Annual Fast Software Encryption Workshop (FSE 2007), Lux-
embourg, 26-28 March 2007, 196-210.
https://doi.org/10.1007/978-3-540-74619-5_13
[3] Borghof, J., Canteaut, A., Güneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R.,
Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S. and
Yalçın, T. (2012) PRINCE—A Low-Latency Block Cipher for Pervasive Computing
Applications. International Conference on the Theory and Application of Cryptol-
ogy and Information Security, Beijing, 2-6 December, 208-225.
https://doi.org/10.1007/978-3-642-34961-4_14
[4] Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J. and Wingers, L.
(2013) The SIMON and SPECK Lightweight Block Ciphers. Proceedings of the
52nd Annual Design Automation Conference, San Francisco, 7-11 June 2015, Ar-
ticle No. 175. https://doi.org/10.1145/2744769.2747946
[5] Yang, G., Zhu, B., Suder, V., Aagaard, M.D. and Gong, G. (2015) The Simeck Fami-
ly of Lightweight Block Ciphers. International Workshop on Cryptographic Hard-
ware and Embedded Systems, Saint Malo, 13-16 September 2015, 307-329.
https://doi.org/10.1007/978-3-662-48324-4_16
[6] Sarkar, S., Syed, H., Sadhukhan, R. and Mukhopadhyay, D. (2017) Lightweight De-
sign Choices for LED-Like Block Ciphers. International Conference on Cryptology
in India, Chennai, 10-13 December 2017, 267-281. https://ia.cr/2017/1031
https://doi.org/10.1007/978-3-319-71667-1_14
[7] Singh, S., Sharma, P.K., Moon, S.Y. and Park, J.H. (2017) Advanced Lightweight
Encryption Algorithms for IoT Devices: Survey, Challenges and Solutions. Journal
of Ambient Intelligece & Human Computing.
https://doi.org/10.1007/s12652-017-0494-4
[8] Alassaf, N., Gutub, A., Parah, S.A. and Al Ghamdi, M. (2018) Enhancing Speed of
SIMON: A Light-Weight-Cryptographic Algorithm for IoT Applications. Multime-
dia Tools and Applications, 78, 32633-32657.
https://doi.org/10.1007/s11042-018-6801-z
[9] Ragab, A.A.M., Madani, A., Wahdan, A.M. and Selim, G.M.I. (2021) Design, Analy-
sis, and Implementation of a New Lightweight Block Cipher for Protecting IoT
Smart Devices. Journal of Ambient Intelligence and Humanized Computing.
https://doi.org/10.1007/s12652-020-02782-6
[10] Anderson, R., Biham, E. and Knudsen, L.R. (1998) Serpent: A Proposal for the Ad-
vanced Encryption Standard. NIST AES Proposal. https://networkdls.com
[11] Suzaki, T., Minematsu, K., Morioka, S. and Kobayashi, E. (2012) TWINE: A
Lightweight Block Cipher for Multiple Platforms. International Conference on Se-
lected Areas in Cryptography, Windsor, 15-16 August 2012, 339-354.
https://doi.org/10.1007/978-3-642-35999-6_22
[12] Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B.,
Seurin, Y. and Vikkelsoe, C. (2007) PRESENT: An Ultra-Lightweight Block Cipher.
International Conference on Cryptographic Hardware and Embedded Systems,
Vienna, 10-13 September 2007, 450-466.
https://doi.org/10.1007/978-3-540-74735-2_31
[13] Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J.,
Jeong, K., Kim, H., Kim, J. and Chee, S. (2006) HIGHT: A New Block Cipher Suita-
ble for Low-Resource Device. International Workshop on Cryptographic Hardware
and Embedded Systems, Yokohama, 10-13 October 2006, 46-59.
https://doi.org/10.1007/11894063_4
[14] Boole, G. (1958) An Investigation of the Laws of Thought on Which Are Founded
the Mathematical Theories of Logic and Probabilities. Walton and Maberly, Lon-
don, 1854; Reprinted with Corrections, Dover Publications, New York.
https://doi.org/10.5962/bhl.title.29413
[15] Shannon, C.E. (1945) A Mathematical Theory of Cryptography. Bell System Tech-
nical Memo MM 45-110-02, September 1.
https://evervault.com/papers/shannon.pdf
[16] Webster, A.F. and Tavares, S.E. (1986) On the Design of S-Boxes. Conference on
the Theory and Application of Cryptographic Techniques, Santa Barbara, 18-22 Au-
gust 1985, 523-534. https://doi.org/10.1007/3-540-39799-X_41
[17] Kam, J.B. and Davida, G. I. (1979) Structured Design of Substitution Permutation
Encryption Networks. IEEE Transactions on Computers, 28, 747-753.
https://doi.org/10.1109/TC.1979.1675242
[18] Feistel, H. (1973) Cryptography and Computer Privacy. Scientific American, 228,
15-23. https://doi.org/10.1038/scientificamerican0573-15
[19] Zhang, X.-M. and Zheng, Y. (1995) GAC—The Criterion for Global Avalanche
Characteristics of Cryptographic Functions. In: Maurer, H., Calude, C. and Salo-
maa, A., Eds., Journal of Universal Computer Science, Vol. 1, Springer, Berlin, Hei-
delberg, 320-337. https://doi.org/10.1007/978-3-642-80350-5_30
[20] Biham, E. and Shamir, A. (1991) Differential Cryptanalysis of DES-Like Cryptosys-
tems. Journal of Cryptology, 4, 3-72. https://doi.org/10.1007/BF00630563
[21] Biham, E. and Shamir, A. (1991) Differential Cryptanalysis of FEAL and N-Hash.
1991 Workshop on the Theory and Application of Cryptographic Techniques, Brigh-
ton, 8-11 April 1991, 1-16. https://doi.org/10.1007/3-540-46416-6_1
[22] Biham, E. and Shamir, A. (1992) Differential Cryptanalysis of the Full 16-Round
DES. Annual International Cryptology Conference 1992, Santa Barbara, 16-20 Au-
gust 1992, 487-496. https://doi.org/10.1007/3-540-48071-4_34
[23] Matsui, M. (1994) Linear Cryptanalysis Method for DES Cipher. Workshop on the
Theory and Application of Cryptographic Techniques 1993, Perugia, 9-12 May 1994,
386-397. https://doi.org/10.1007/3-540-48285-7_33
[24] Matsui, M. (1994) The First Experimental Cryptanalysis of the Data Encryption Stan-
dard. Annual International Cryptology Conference 1994, Santa Barbara, 21-25 Au-
gust, 1-11. https://doi.org/10.1007/3-540-48658-5_1
[25] Courtois, N. (2003) Fast Algebraic Attacks on Stream Ciphers with Linear Feed-
back. Annual International Cryptology Conference 2003, Santa Barbara, 17-21 Au-
gust 2003, 177-194. https://doi.org/10.1007/978-3-540-45146-4_11
[26] Courtois, N. and Meier, W. (2003) Algebraic Attacks on Stream Ciphers with Linear
Feedback. International Conference on the Theory and Applications of Cryptographic
Techniques 2003, Warsaw, 4-8 May, 346-359.
https://doi.org/10.1007/3-540-39200-9_21
[27] Faugére, J.-C. and Ars, G. (2003) An Algebraic Cryptanalysis of Nonlinear Filter
Generators Using Grobner Bases. RR-4739, INRIA (National Institute for Research
in Digital Science and Technology), Paris. https://hal.inria.fr/inria-00071848
[28] Camion, P., Carlet, C., Charpin, P. and Sendrier, N. (1991) On Correlation-Immune
Functions. Annual International Cryptology Conference 1991, Santa Barbara, 16-20
August 1991, 86-100. https://doi.org/10.1007/3-540-46766-1_6
[29] Dey, S. and Ghosh, R. (2018) A Review of Cryptographic Properties of S-Boxes with
Generation and Analysis of Crypto Secure S-Boxes. PeerJ Preprints, 6, Article ID:
e26452v1. https://doi.org/10.7287/peerj.preprints.26452v1