Publication: Systematic literature review: Trend analysis on the design of lightweight block cipher
Loading...
Date
2023-05
Journal Title
Journal ISSN
Volume Title
Publisher
Elsevier BV
Abstract
Lightweight block ciphers have become a standard for security protections on IoT devices. Advanced technology is required to secure the data, thus encryption is the method that can provide information security. From previous studies, comparisons of lightweight algorithms in various literature focus on their performance and implementation. However, a lack of analysis has been done on the relationship between the algorithm components and their security strength. This information is crucial for developers in designing secure algorithms. In this paper, a comprehensive systematic literature review on 101 existing lightweight algorithms is presented. This review focuses on the security aspect of lightweight algorithms that cover the identification of secure design components based on substitution and permutation. Security analysis and the evolution of lightweight algorithms are also presented. This research includes the results and discussions to observe the selections of substitution and permutation functions to analyse their impact on the security strength. Recommendations from the developer's insight on methods and considerations for designing an algorithm are also presented. Findings from the research indicate that various techniques can be used to develop a secure algorithm. Most importantly, an algorithm must be provided with confusion and diffusion properties in the design to ensure sufficient security
Description
Journal of King Saud University - Computer and Information Sciences Volume 35 Issue 5 Page (1-28)
Keywords
Confusion, Cryptanalysis, Diffusion, Evolution of algorithm, Lightweight cryptography, Permutation, Secure design components, Substitution
Citation
Zakaria, A. A., Azni, A. H., Ridzuan, F., Zakaria, N. H., & Daud, M. (2023). Systematic literature review: Trend analysis on the design of lightweight block cipher. Journal of King Saud University - Computer and Information Sciences, 35(5), 101550. https://doi.org/10.1016/j.jksuci.2023.04.003
URI
https://oarep.usim.edu.my/handle/123456789/18891
https://oarep.usim.edu.my/server/api/core/bitstreams/a7104717-f126-4f60-ba72-a202f5ed8abc/content?authentication-token=eyJhbGciOiJIUzI1NiJ9.eyJlaWQiOiJlMmVkZjQ3Ni00ZjI5LTRiNWYtYmYwMy0yZmM0ODEwNWU5OWIiLCJzZyI6W10sImF1dGhlbnRpY2F0aW9uTWV0aG9kIjoicGFzc3dvcmQiLCJtYWNoaW5lIjpmYWxzZSwiZXhwIjoxNzIyODQyOTM0LCJ1c2VyQWdyZWVtZW50QWNjZXB0ZWQiOiJ0cnVlIn0.OPanSI9xEvDSfi0MHDlIwD0Co8HnLKaR6UJWc75IZmI
https://oarep.usim.edu.my/server/api/core/bitstreams/a7104717-f126-4f60-ba72-a202f5ed8abc/content?authentication-token=eyJhbGciOiJIUzI1NiJ9.eyJlaWQiOiJlMmVkZjQ3Ni00ZjI5LTRiNWYtYmYwMy0yZmM0ODEwNWU5OWIiLCJzZyI6W10sImF1dGhlbnRpY2F0aW9uTWV0aG9kIjoicGFzc3dvcmQiLCJtYWNoaW5lIjpmYWxzZSwiZXhwIjoxNzIyODQyOTM0LCJ1c2VyQWdyZWVtZW50QWNjZXB0ZWQiOiJ0cnVlIn0.OPanSI9xEvDSfi0MHDlIwD0Co8HnLKaR6UJWc75IZmI