Abdul Alif ZakariaA.H. AzniFarida RidzuanNur Hafiza ZakariaMaslina Daud2024-06-042024-06-042023-05Zakaria, A. A., Azni, A. H., Ridzuan, F., Zakaria, N. H., & Daud, M. (2023). Systematic literature review: Trend analysis on the design of lightweight block cipher. Journal of King Saud University - Computer and Information Sciences, 35(5), 101550. https://doi.org/10.1016/j.jksuci.2023.04.00310.1016/j.jksuci.2023.04.003https://oarep.usim.edu.my/handle/123456789/18891https://oarep.usim.edu.my/server/api/core/bitstreams/a7104717-f126-4f60-ba72-a202f5ed8abc/content?authentication-token=eyJhbGciOiJIUzI1NiJ9.eyJlaWQiOiJlMmVkZjQ3Ni00ZjI5LTRiNWYtYmYwMy0yZmM0ODEwNWU5OWIiLCJzZyI6W10sImF1dGhlbnRpY2F0aW9uTWV0aG9kIjoicGFzc3dvcmQiLCJtYWNoaW5lIjpmYWxzZSwiZXhwIjoxNzIyODQyOTM0LCJ1c2VyQWdyZWVtZW50QWNjZXB0ZWQiOiJ0cnVlIn0.OPanSI9xEvDSfi0MHDlIwD0Co8HnLKaR6UJWc75IZmIJournal of King Saud University - Computer and Information Sciences Volume 35 Issue 5 Page (1-28)Lightweight block ciphers have become a standard for security protections on IoT devices. Advanced technology is required to secure the data, thus encryption is the method that can provide information security. From previous studies, comparisons of lightweight algorithms in various literature focus on their performance and implementation. However, a lack of analysis has been done on the relationship between the algorithm components and their security strength. This information is crucial for developers in designing secure algorithms. In this paper, a comprehensive systematic literature review on 101 existing lightweight algorithms is presented. This review focuses on the security aspect of lightweight algorithms that cover the identification of secure design components based on substitution and permutation. Security analysis and the evolution of lightweight algorithms are also presented. This research includes the results and discussions to observe the selections of substitution and permutation functions to analyse their impact on the security strength. Recommendations from the developer's insight on methods and considerations for designing an algorithm are also presented. Findings from the research indicate that various techniques can be used to develop a secure algorithm. Most importantly, an algorithm must be provided with confusion and diffusion properties in the design to ensure sufficient securityen-USConfusionCryptanalysisDiffusionEvolution of algorithmLightweight cryptographyPermutationSecure design componentsSubstitutionSystematic literature review: Trend analysis on the design of lightweight block cipherjournal-article