Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

被引:10
|
作者
Windarta, Susila [1 ]
Suryadi, Suryadi [2 ]
Ramli, Kalamullah [1 ]
Pranggono, Bernardi [3 ]
Gunawan, Teddy Surya [4 ]
机构
[1] Univ Indonesia, Fac Engn, Dept Elect Engn, Depok, Jawa Barat, Indonesia
[2] Univ Indonesia, Fac Math & Nat Sci, Dept Math, Depok 16424, Jawa Barat, Indonesia
[3] Sheffield Hallam Univ, Dept Engn & Math, Sheffield S1 1WB, S Yorkshire, England
[4] Int Islamic Univ Malaysia, Dept Elect & Comp Engn, Kulliyyah Engn, Kuala Lumpur 50728, Malaysia
关键词
Cryptography; Cryptographic hash function; Internet of Things; Ciphers; Security; Measurement; Software algorithms; lightweight cryptographic hash function; lightweight cryptography; security; CRYPTANALYSIS; CIPHER; IOT; INTERNET; AUTHENTICATION; ARCHITECTURE; SPONGE; FAMILY;
D O I
10.1109/ACCESS.2022.3195572
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives that provide data integrity services. However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. As a result, researchers have proposed various lightweight cryptographic hash function algorithms. In this paper, we discuss advanced lightweight cryptographic hash functions for highly constrained devices, categorize design trends, analyze cryptographic aspects and cryptanalytic attacks, and present a comparative analysis of different hardware and software implementations. In the final section of this paper, we highlight present research challenges and suggest future research topics related to the design of lightweight cryptographic hash functions.
引用
收藏
页码:82272 / 82294
页数:23
相关论文
共 50 条
  • [1] Bad Directions in Cryptographic Hash Functions
    Bernstein, Daniel J.
    Huelsing, Andreas
    Lange, Tanja
    Niederhagen, Ruben
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 488 - 508
  • [2] Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)
    Alfrhan, Aishah
    Moulahi, Tarek
    Alabdulatif, Abdulatif
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2021, 2 (04):
  • [3] ON THE DESIGN OF PROVABLY-SECURE CRYPTOGRAPHIC HASH FUNCTIONS
    DESANTIS, A
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 412 - 431
  • [4] A systems theoretic approach to the design of scalable cryptographic hash functions
    Scharinger, Josef
    [J]. COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 10 - 17
  • [5] Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things
    Windarta, Susila
    Suryadi, Suryadi
    Ramli, Kalamullah
    Lestari, Andriani Adi
    Wildan, Wildan
    Pranggono, Bernardi
    Wardhani, Rini Wisnu
    [J]. IEEE ACCESS, 2023, 11 : 84074 - 84090
  • [6] A Systematic Study of Lightweight Hash Functions on FPGAs
    Jungk, Bernhard
    Lima, Leandro Rodrigues
    Hiller, Matthias
    [J]. 2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [7] Automated design of cryptographic hash schemes by evolving highly-nonlinear functions
    Estevez-Tapiador, Juan M.
    Hernandez-Castro, Julio C.
    Peris-Lopez, Pedro
    Ribagorda, Arturo
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (05) : 1485 - 1504
  • [8] Automated design of cryptographic hash schemes by evolving highly-nonlinear functions
    Department of Computer Science, Carlos III University of Madrid, 28911 Legones, Madrid, Spain
    [J]. J. Inf. Sci. Eng., 2008, 5 (1485-1504):
  • [9] Comparison Study of Lightweight Hash Functions for an Authentication Solution on IoT
    Jebrane, Jihane
    Lazaar, Saiida
    [J]. ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 2, 2022, 1418 : 1189 - 1193
  • [10] Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions
    Sadhya, Debanjan
    Singh, Sanjay Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (12) : 15113 - 15137