Cryptographic Strength in Resource-Constrained IoT: XTEA vs. RECTANGLE
Keywords:
VIVADO, RECTANGLE, XTEA, NIST, RandomnessAbstract
This paper introduces two prominent lightweight ciphers: XTEA and RECTANGLE. The exposition provides a detailed elucidation of their respective design principles, security features, and suitability for IoT applications. It is essential to comprehend how these ciphers operate, and this section affords readers a comprehensive insight into their inner workings.
The study takes a pivotal turn as we assess the hardware implementation metrics of both ciphers on an FPGA platform. This assessment reveals the resource efficiency of each cipher, with RECTANGLE emerging as the more resource-friendly choice. Such evaluations are vital in enabling informed decisions when selecting cryptographic solutions for resource-constrained environments.
An indispensable facet of this study revolves around the evaluation of randomness, a paramount factor in cryptographic security. To accomplish this, we employ the NIST Test Suite to scrutinize the randomness exhibited by both XTEA and RECTANGLE. The outcomes of these tests provide valuable insights into the cryptographic strength of each cipher. Notably, XTEA demonstrates superior randomness in certain tests, including the Linear Complexity Test, showcasing its unique attributes.
In conclusion, this paper underscores the pivotal role of lightweight cryptography in fortifying the security of IoT and IoE ecosystems. Through a meticulous comparative analysis of two prominent lightweight ciphers, it offers invaluable insights for researchers and practitioners navigating the complex landscape of interconnected devices and services. The findings of this study contribute significantly to the ongoing discourse surrounding the delicate equilibrium between security imperatives and the resource constraints inherent to IoT environments.
Downloads
References
Hatzivasilis, George & Fysarakis, Konstantinos & Papaefstathiou, Ioannis & Manifavas, Harry. (2018). A review of lightweight block ciphers. Journal of Cryptographic Engineering. 8. 1-44. 10.1007/s13389-017-0160-y.
Thakor, M. Razzaque, and M. Khandaker, “Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities,” IEEE Access, vol. 9, 2021
M. Jangra and & Buddha Singh, “Performance analysis of CLEFIA and PRESENT lightweight block ciphers,” Journal of Discrete Mathe- matical Sciences and Cryptography, vol. 22, no. 8, pp. 1489–1499, 2019.
Manjushree B Somasagar , Dr. Kiran Bailey, 2020, CLEFIA- A Encryption Algorithm using Novel S-Box Architecture, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 09, Issue 07 (July 2020),
T. Cihangir, Ali, and S. Aydın, “Improved improbable differential attacks on ISO standard CLEFIA,” Information Processing Letters, pp. 136–143, 2016
Z. Guo, W. Wu, and S. Gao, “Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure,” Selected Areas in Cryp- tography - SAC 2015. vol. 9566, 2016.
Rashidi, Bahram. (2020). Efficient and Flexible Hardware Structures of the 128-bit CLEFIA Block Cipher. IET Computers & Digital Techniques. 14. 10.1049/iet-cdt.2019.0157..
K. He, X. Zhang, S. Ren, and J. Sun, “Deep Residual Learning for Image Recognition,” 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778, 2016.
Cheng, Xin & Zhu, Haowen & Xu, Yixuan & Zhang, Yongqiang & Xiao, Hao & Zhang, Zhang. (2021). A reconfigurable and compact hardware architecture of CLEFIA block cipher with multi-configuration. Microelectronics Journal. 114. 105144. 10.1016/j.mejo.2021.105144.
M. Imdad, S. N. Ramli, and H. Mahdin, “An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys,” Symmetry, vol. 14, no. 3, p. 604, Mar. 2022, doi: 10.3390/sym14030604.
A. Poojary, V. G. K. Kumar, and H. R. Nagesh, “FPGA implementation novel lightweight MBRISI cipher,” J Ambient Intell Human Comput, vol. 14, pp. 11 625–11 637, 2023.
“FPGA implementation novel lightweight MBRISI cipher,” J Ambient Intell Human Comput, vol. 14, pp. 11 625–11 637 k Cipher for Random and Non-Random Secret Keys. , 2023
V. A. Thakor, M. A. Razzaque, and M. Khandaker, “Lightweight cryptography algorithms for resource-constrained IoT devices: a re- view, comparison and research opportunities,” IEEE Access, vol. 9, pp. 28 177–28 193, 2021
Y. -T. Teng, W. -L. Chin, D. -K. Chang, P. -Y. Chen and P. -W. Chen, "VLSI Architecture of S-Box With High Area Efficiency Based on Composite Field Arithmetic," in IEEE Access, vol. 10, pp. 2721-2728, 2022, doi: 10.1109/ACCESS.2021.3139040.
I. N. Mohammad Shah, E. S. Ismail, F. Samat, and N. Nek Abd Rahman, “Modified Generalized Feistel Network Block Cipher for the Internet of Things,” Symmetry, vol. 15, no. 4, p. 900, Apr. 2023, doi: 10.3390/sym15040900. [Online]. Available: http://dx.doi.org/10.3390/sym15040900
Rourab, Paul., Hemanta, Dey., Amlan, Chakrabrti., Ranjan, Ghosh. "NIST Statistical Test Suite." arXiv: Applications, undefined (2016).
Atsushi, Iwasaki. "The relation between Proportion test and Uniformity test in NIST SP800-22." undefined (2020). doi: 10.34385/PROC.65.C01-8
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.