Cryptographic Strength in Resource-Constrained IoT: XTEA vs. RECTANGLE

Authors

  • Ramya K. V.
  • Manjunatha Reddy H. S. Dept of ECE, Global Academy of Technology, Visvesvaraya Institute of Technology, Belagavi 590018
  • Bharathi C. Dept of ECE, Global Academy of Technology, Visvesvaraya Institute of Technology, Belagavi 590018
  • Mamata Dhananjaya Dept of ECE, Global Academy of Technology, Visvesvaraya Institute of Technology, Belagavi 590018

Keywords:

VIVADO, RECTANGLE, XTEA, NIST, Randomness

Abstract

This paper introduces two prominent lightweight ciphers: XTEA and RECTANGLE. The exposition provides a detailed elucidation of their respective design principles, security features, and suitability for IoT applications. It is essential to comprehend how these ciphers operate, and this section affords readers a comprehensive insight into their inner workings.

The study takes a pivotal turn as we assess the hardware implementation metrics of both ciphers on an FPGA platform. This assessment reveals the resource efficiency of each cipher, with RECTANGLE emerging as the more resource-friendly choice. Such evaluations are vital in enabling informed decisions when selecting cryptographic solutions for resource-constrained environments.

An indispensable facet of this study revolves around the evaluation of randomness, a paramount factor in cryptographic security. To accomplish this, we employ the NIST Test Suite to scrutinize the randomness exhibited by both XTEA and RECTANGLE. The outcomes of these tests provide valuable insights into the cryptographic strength of each cipher. Notably, XTEA demonstrates superior randomness in certain tests, including the Linear Complexity Test, showcasing its unique attributes.

In conclusion, this paper underscores the pivotal role of lightweight cryptography in fortifying the security of IoT and IoE ecosystems. Through a meticulous comparative analysis of two prominent lightweight ciphers, it offers invaluable insights for researchers and practitioners navigating the complex landscape of interconnected devices and services. The findings of this study contribute significantly to the ongoing discourse surrounding the delicate equilibrium between security imperatives and the resource constraints inherent to IoT environments.

Downloads

Download data is not yet available.

References

Hatzivasilis, George & Fysarakis, Konstantinos & Papaefstathiou, Ioannis & Manifavas, Harry. (2018). A review of lightweight block ciphers. Journal of Cryptographic Engineering. 8. 1-44. 10.1007/s13389-017-0160-y.

Thakor, M. Razzaque, and M. Khandaker, “Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities,” IEEE Access, vol. 9, 2021

M. Jangra and & Buddha Singh, “Performance analysis of CLEFIA and PRESENT lightweight block ciphers,” Journal of Discrete Mathe- matical Sciences and Cryptography, vol. 22, no. 8, pp. 1489–1499, 2019.

Manjushree B Somasagar , Dr. Kiran Bailey, 2020, CLEFIA- A Encryption Algorithm using Novel S-Box Architecture, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 09, Issue 07 (July 2020),

T. Cihangir, Ali, and S. Aydın, “Improved improbable differential attacks on ISO standard CLEFIA,” Information Processing Letters, pp. 136–143, 2016

Z. Guo, W. Wu, and S. Gao, “Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure,” Selected Areas in Cryp- tography - SAC 2015. vol. 9566, 2016.

Rashidi, Bahram. (2020). Efficient and Flexible Hardware Structures of the 128-bit CLEFIA Block Cipher. IET Computers & Digital Techniques. 14. 10.1049/iet-cdt.2019.0157..

K. He, X. Zhang, S. Ren, and J. Sun, “Deep Residual Learning for Image Recognition,” 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778, 2016.

Cheng, Xin & Zhu, Haowen & Xu, Yixuan & Zhang, Yongqiang & Xiao, Hao & Zhang, Zhang. (2021). A reconfigurable and compact hardware architecture of CLEFIA block cipher with multi-configuration. Microelectronics Journal. 114. 105144. 10.1016/j.mejo.2021.105144.

M. Imdad, S. N. Ramli, and H. Mahdin, “An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys,” Symmetry, vol. 14, no. 3, p. 604, Mar. 2022, doi: 10.3390/sym14030604.

A. Poojary, V. G. K. Kumar, and H. R. Nagesh, “FPGA implementation novel lightweight MBRISI cipher,” J Ambient Intell Human Comput, vol. 14, pp. 11 625–11 637, 2023.

“FPGA implementation novel lightweight MBRISI cipher,” J Ambient Intell Human Comput, vol. 14, pp. 11 625–11 637 k Cipher for Random and Non-Random Secret Keys. , 2023

V. A. Thakor, M. A. Razzaque, and M. Khandaker, “Lightweight cryptography algorithms for resource-constrained IoT devices: a re- view, comparison and research opportunities,” IEEE Access, vol. 9, pp. 28 177–28 193, 2021

Y. -T. Teng, W. -L. Chin, D. -K. Chang, P. -Y. Chen and P. -W. Chen, "VLSI Architecture of S-Box With High Area Efficiency Based on Composite Field Arithmetic," in IEEE Access, vol. 10, pp. 2721-2728, 2022, doi: 10.1109/ACCESS.2021.3139040.

I. N. Mohammad Shah, E. S. Ismail, F. Samat, and N. Nek Abd Rahman, “Modified Generalized Feistel Network Block Cipher for the Internet of Things,” Symmetry, vol. 15, no. 4, p. 900, Apr. 2023, doi: 10.3390/sym15040900. [Online]. Available: http://dx.doi.org/10.3390/sym15040900

Rourab, Paul., Hemanta, Dey., Amlan, Chakrabrti., Ranjan, Ghosh. "NIST Statistical Test Suite." arXiv: Applications, undefined (2016).

Atsushi, Iwasaki. "The relation between Proportion test and Uniformity test in NIST SP800-22." undefined (2020). doi: 10.34385/PROC.65.C01-8

Downloads

Published

13.12.2023

How to Cite

K. V., R. ., Reddy H. S., M. ., C., B. ., & Dhananjaya, M. . (2023). Cryptographic Strength in Resource-Constrained IoT: XTEA vs. RECTANGLE. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 599–605. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4232

Issue

Section

Research Article