Developing and Evaluating Lightweight Cryptographic Algorithms for Secure Embedded Systems in IoT Devices
- URL: http://arxiv.org/abs/2601.02981v1
- Date: Tue, 06 Jan 2026 12:45:12 GMT
- Title: Developing and Evaluating Lightweight Cryptographic Algorithms for Secure Embedded Systems in IoT Devices
- Authors: Brahim Khalil Sedraoui, Abdelmadjid Benmachiche, Amina Makhlouf,
- Abstract summary: The study presents novel lightweight algorithms that are founded upon the Feistel-network architecture and their safety under cryptanalytic attacks.<n>The results have shown that lightweight cryptography is an effective strategy that could be used to establish security and maintain performance in the IoT.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The high rate of development of Internet of Things (IoT) devices has brought to attention new challenges in the area of data security, especially within the resource-limited realm of RFID tags, sensors, and embedded systems. Traditional cryptographic implementations can be of inappropriate computational complexity and energy usage and hence are not suitable on these platforms. This paper examines the design, implementation, and testing of lightweight cryptographic algorithms that have been specifically designed to be used in secure embedded systems. A comparison of some of the state-of-the-art lightweight encryption algorithms, that is PRESENT, SPECK, and SIMON, focuses on the main performance indicators, i.e., throughput, use of memory, and energy utilization. The study presents novel lightweight algorithms that are founded upon the Feistel-network architecture and their safety under cryptanalytic attacks, e.g., differential and linear cryptanalysis. The proposed solutions are proven through hardware implementation on the FPGA platform. The results have shown that lightweight cryptography is an effective strategy that could be used to establish security and maintain performance in the IoT and other resource-limited settings.
Related papers
- Systematic Review of Lightweight Cryptographic Algorithms [0.764671395172401]
AES, RSA, and DES are unsuitable for resource-constrained devices due to limited processing power, memory, and battery.<n>This paper provides a systematic review of lightweight cryptographic algorithms and the appropriateness of different algorithms in different areas such as IoT, RFID, and wireless sensor networks.<n>An overview of the evolution of lightweight cryptography based on those design trade-offs is also provided.
arXiv Detail & Related papers (2026-02-16T13:23:03Z) - Time-Complexity Characterization of NIST Lightweight Cryptography Finalists [0.0]
Lightweight cryptography is becoming essential as emerging technologies in digital identity systems and Internet of Things verification continue to demand strong cryptographic assurance on devices with limited processing power, memory, and energy resources.<n>As these technologies move into routine use, they demand cryptographic primitives that maintain strong security and deliver predictable performance through clear theoretical models of time complexity.<n>Although NIST's lightweight cryptography project provides empirical evaluations of the ten finalist algorithms, a unified theoretical understanding of their time-complexity behavior remains absent.
arXiv Detail & Related papers (2026-02-05T13:22:18Z) - Key Length-Oriented Classification of Lightweight Cryptographic Algorithms for IoT Security [0.0]
This study focuses on the security evaluation of lightweight symmetric ciphers commonly used in IoT systems.<n>Our findings indicate that key size is a critical parameter in the security of lightweight ciphers.<n> Ciphers employing keys shorter than 128 bits are considered less secure or even insecure for protecting sensitive data.
arXiv Detail & Related papers (2025-12-23T22:54:48Z) - Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA [0.0]
This thesis focuses on low overhead generic circuit-level yet synthesizable countermeasures against power and EM SCA.<n>Existing countermeasures (including proposed) still have relatively high overhead which bars them from being used in energy-constraint IoT devices.<n>I contribute to the standardization procedure by introducing the first silicon-verified Saber.
arXiv Detail & Related papers (2025-11-29T21:12:22Z) - Evaluating Post-Quantum Cryptographic Algorithms on Resource-Constrained Devices [1.571445233233759]
This paper investigates the feasibility of deploying post-quantum cryptography (PQC) algorithms on resource-constrained devices.<n>We implement three PQC algorithms -- BIKE, CRYSTALS-Kyber, and HQC -- on a lightweight IoT platform built with Raspberry Pi devices.
arXiv Detail & Related papers (2025-07-11T05:03:19Z) - A PyTorch-Compatible Spike Encoding Framework for Energy-Efficient Neuromorphic Applications [36.52207669429316]
Spiking Neural Networks (SNNs) offer promising energy efficiency advantages, particularly when processing sparse spike trains.<n>This paper introduces a novel, open-source PyTorch-compatible Python framework for spike encoding.
arXiv Detail & Related papers (2025-04-15T09:50:03Z) - Cryptanalysis via Machine Learning Based Information Theoretic Metrics [58.96805474751668]
We propose two novel applications of machine learning (ML) algorithms to perform cryptanalysis on any cryptosystem.<n>These algorithms can be readily applied in an audit setting to evaluate the robustness of a cryptosystem.<n>We show that our classification model correctly identifies the encryption schemes that are not IND-CPA secure, such as DES, RSA, and AES ECB, with high accuracy.
arXiv Detail & Related papers (2025-01-25T04:53:36Z) - Comparison of Encryption Algorithms for Wearable Devices in IoT Systems [0.0]
The Internet of Things (IoT) expansion has brought a new era of connected devices, including wearable devices like smartwatches and medical monitors.
Wearable devices offer innovative functionalities but also generate and transmit plenty of sensitive data, making their security and privacy the primary concerns.
Various encryption algorithms, each with its own set of advantages and limitations, are available to meet the diverse security and computational needs of wearable IoT devices.
arXiv Detail & Related papers (2024-09-01T19:08:52Z) - HAPM -- Hardware Aware Pruning Method for CNN hardware accelerators in resource constrained devices [44.99833362998488]
The present work proposes a generic hardware architecture ready to be implemented on FPGA devices.
The inference speed of the design is evaluated over different resource constrained FPGA devices.
We demonstrate that our hardware-aware pruning algorithm achieves a remarkable improvement of a 45 % in inference time compared to a network pruned using the standard algorithm.
arXiv Detail & Related papers (2024-08-26T07:27:12Z) - Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices [38.16309790239142]
Intrusion Detection Systems (IDSs) have played a significant role in detecting and preventing cyber-attacks within traditional computing systems.
The limited computational resources available on Internet of Things (IoT) devices make it challenging to deploy conventional computing-based IDSs.
We propose a hybrid CNN architecture composed of a lightweight CNN and bidirectional LSTM (BiLSTM) to enhance the performance of IDS on the UNSW-NB15 dataset.
arXiv Detail & Related papers (2024-06-04T20:36:21Z) - Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer? [0.0]
Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices.
It is necessary to test these algorithms for resilience against differential cryptanalysis attacks.
In this paper, we introduce Versatile Investigative Sampling Technique for Advanced Cryptanalysis.
arXiv Detail & Related papers (2024-04-12T00:08:39Z) - A Novel RFID Authentication Protocol Based on A Block-Order-Modulus Variable Matrix Encryption Algorithm [33.418596635960085]
authentication for mobile radio frequency identification (RFID) systems with low-cost RFID sensor tags is studied.
Numerical results demonstrate that the proposed AM-SUEO-DBLTKM algorithm can save 99.59% of tag storage over traditional algorithms.
arXiv Detail & Related papers (2023-12-17T02:55:13Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.