SlideShare a Scribd company logo
1 of 13
Light Weight
Cryptography for IOT
What is Internet of Things?
It’s basically collection of devices that are connected to the Internet and communicate with
other devices.
The term was coined by Kevin Ashton in 1999.
A Coke vending machine at Carnegie Mellon U. is considered as the first IoT device (1982).
IoT Applications
Smart Homes
Wearables
Retail
Smart Cities
Healthcare
Transportation
Industry
Why Lightweight Cryptography
Typical IoT devices are resource-constrained. They generally have
lower computational power,
smaller memory size,
lower power consumption,
smaller physical size,
lower price
than full-fledged devices such as PCs, laptops, or tablets. We need cryptography algorithms that
have small footprints and consume low power without sacrificing security.
ISO/IEC 29192
Is about standards on lightweight cryptography.
Lightweight cryptography is classified by a combination of the constraints on chip area, energy
consumption, program code and RAM size, communication bandwidth, and execution time.
Defines 80 bits security as the minimum security strength for lightweight cryptography.
Specifies a number of block ciphers, stream ciphers, and hash functions as standards.
Not yet completed. Work still in progress for standards on MAC.
Block Ciphers
Block ciphers specified by ISO/IEC 29192:
PRESENT: 64 bits block size and 80 or 128 bits key size
CLEFIA: 128 bits block size and 128, 192, and 256 bits key size
SIMON: 48 – 128 bits block size, 96 – 256 bits key size
SPECK: 48 – 128 bits block size, 96 – 256 bits key size
PRESENT Block Cipher
Designed for some very specific applications for which AES is unsuitable.
Designed to conform these characteristics:
To be implemented on hardware
For applications that only need moderate security level
For applications that unlikely to encrypt large amount of data
Where physical size, power consumption, and execution time are the primary concerns (after security).
For some applications it is possible that the key will be fixed at the time when the device is
manufactured.
For some applications the cipher will be used to perform encryption only.
Hardware implementation of PRESENT has much higher throughput and requires a half of gates
compared to the implementation of AES with similar key size.
SIMON and SPECK Block Ciphers
Flexible secure block ciphers, can perform well on any platform.
64-256 bits key size, bits block size
SIMON is more hardware oriented, SPECK is more software oriented.
Hardware implementation requires less gates than other algorithms.
Stream Ciphers
ISO/IEC 29192 specifies two stream ciphers:
Enocoro: 80 or 128 bits key size
Trivium: 80 bits key size
Both of them are hardware oriented.
The literatures do not really explain much about why these algorithms are considered
‘lightweight’ and do not compare them to other algorithms.
Hash Functions
ISO/IEC 29192 specifies three hash functions:
PHOTON: permutation size bits and output size bits
SPONGENT: permutation size bits and output size bits
Lesamnta-LW: permutation size 384 bits and outputs size 256 bits
SPONGENT Hash Function
Five different hash sizes: 88, 128, 160, 224, 256
Three types pre-image and second pre-image security level:
1) Full pre-image and second pre-image security level
2) Reduced second pre-image security level
3) Reduced pre-image and second pre-image security level
Lesamnta-LW Hash Function
Lightweight 256 bits hash function
Has collision, pre-image, and second pre-image security level of at least 2120.
Hardware implementation only requires 8240 gates.
Software implementation only requires 50 bytes of RAM and runs fast on short messages on 8-
bit CPUs.
Comparison
Cryptography algorithms designed for IoT are ‘lightweight’ because:
Designed specifically for constrained devices such as RFID tags and networked sensors (hardware
oriented).
Have several security levels that are sufficient to different types of applications.
Designed to process only small amount of data.
Existing popular cryptography algorithms are ‘heavy’ because:
Designed as general-purpose algorithms.
Generally software-oriented.
High security level.
Can process large amount of data.

More Related Content

What's hot

What's hot (20)

LTE - Qualcomm Leading the Global Success
LTE - Qualcomm Leading the Global SuccessLTE - Qualcomm Leading the Global Success
LTE - Qualcomm Leading the Global Success
 
Usb protocol
Usb protocol Usb protocol
Usb protocol
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Cpld fpga
Cpld fpgaCpld fpga
Cpld fpga
 
lesson2 - Nodemcu course - NodeMCU dev Board
 lesson2 - Nodemcu course - NodeMCU dev Board lesson2 - Nodemcu course - NodeMCU dev Board
lesson2 - Nodemcu course - NodeMCU dev Board
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
5 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT15 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT1
 
5G network architecture progress
5G network architecture progress5G network architecture progress
5G network architecture progress
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Internet of Things Using Arduino
Internet of Things Using ArduinoInternet of Things Using Arduino
Internet of Things Using Arduino
 
Risc
RiscRisc
Risc
 
Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Comparison of Wifi, Lifi and Gifi
Comparison of Wifi, Lifi and GifiComparison of Wifi, Lifi and Gifi
Comparison of Wifi, Lifi and Gifi
 
Zigbee
ZigbeeZigbee
Zigbee
 
Basics of arduino uno
Basics of arduino unoBasics of arduino uno
Basics of arduino uno
 
Embedded Android : System Development - Part III (Audio / Video HAL)
Embedded Android : System Development - Part III (Audio / Video HAL)Embedded Android : System Development - Part III (Audio / Video HAL)
Embedded Android : System Development - Part III (Audio / Video HAL)
 
Sensor networks: 6LoWPAN & LPWAN
Sensor networks: 6LoWPAN & LPWANSensor networks: 6LoWPAN & LPWAN
Sensor networks: 6LoWPAN & LPWAN
 
Wi-Fi 6.pptx
Wi-Fi 6.pptxWi-Fi 6.pptx
Wi-Fi 6.pptx
 

Similar to Light Weight Cryptography for IOT.pptx

Brochure (2016-01-30)
Brochure (2016-01-30)Brochure (2016-01-30)
Brochure (2016-01-30)
Jonah McLeod
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
iaemedu
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
eSAT Journals
 

Similar to Light Weight Cryptography for IOT.pptx (20)

Iaetsd near field
Iaetsd near fieldIaetsd near field
Iaetsd near field
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
Brochure (2016-01-30)
Brochure (2016-01-30)Brochure (2016-01-30)
Brochure (2016-01-30)
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
ETHERNET PACKET PROCESSOR FOR SOC APPLICATION
ETHERNET PACKET PROCESSOR FOR SOC APPLICATIONETHERNET PACKET PROCESSOR FOR SOC APPLICATION
ETHERNET PACKET PROCESSOR FOR SOC APPLICATION
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
iOT - Developing beacons
iOT - Developing beaconsiOT - Developing beacons
iOT - Developing beacons
 
Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
Introduction to Oberon HomeKit SDKs
Introduction to Oberon HomeKit SDKsIntroduction to Oberon HomeKit SDKs
Introduction to Oberon HomeKit SDKs
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
 
Appl 1340
Appl 1340Appl 1340
Appl 1340
 

Recently uploaded

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 

Recently uploaded (20)

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New GirlfriendDubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
Delivery in 20 Mins Call Girls Cuttack 9332606886 HOT & SEXY Models beautifu...
Delivery in 20 Mins Call Girls Cuttack  9332606886 HOT & SEXY Models beautifu...Delivery in 20 Mins Call Girls Cuttack  9332606886 HOT & SEXY Models beautifu...
Delivery in 20 Mins Call Girls Cuttack 9332606886 HOT & SEXY Models beautifu...
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 

Light Weight Cryptography for IOT.pptx

  • 2. What is Internet of Things? It’s basically collection of devices that are connected to the Internet and communicate with other devices. The term was coined by Kevin Ashton in 1999. A Coke vending machine at Carnegie Mellon U. is considered as the first IoT device (1982).
  • 3. IoT Applications Smart Homes Wearables Retail Smart Cities Healthcare Transportation Industry
  • 4. Why Lightweight Cryptography Typical IoT devices are resource-constrained. They generally have lower computational power, smaller memory size, lower power consumption, smaller physical size, lower price than full-fledged devices such as PCs, laptops, or tablets. We need cryptography algorithms that have small footprints and consume low power without sacrificing security.
  • 5. ISO/IEC 29192 Is about standards on lightweight cryptography. Lightweight cryptography is classified by a combination of the constraints on chip area, energy consumption, program code and RAM size, communication bandwidth, and execution time. Defines 80 bits security as the minimum security strength for lightweight cryptography. Specifies a number of block ciphers, stream ciphers, and hash functions as standards. Not yet completed. Work still in progress for standards on MAC.
  • 6. Block Ciphers Block ciphers specified by ISO/IEC 29192: PRESENT: 64 bits block size and 80 or 128 bits key size CLEFIA: 128 bits block size and 128, 192, and 256 bits key size SIMON: 48 – 128 bits block size, 96 – 256 bits key size SPECK: 48 – 128 bits block size, 96 – 256 bits key size
  • 7. PRESENT Block Cipher Designed for some very specific applications for which AES is unsuitable. Designed to conform these characteristics: To be implemented on hardware For applications that only need moderate security level For applications that unlikely to encrypt large amount of data Where physical size, power consumption, and execution time are the primary concerns (after security). For some applications it is possible that the key will be fixed at the time when the device is manufactured. For some applications the cipher will be used to perform encryption only. Hardware implementation of PRESENT has much higher throughput and requires a half of gates compared to the implementation of AES with similar key size.
  • 8. SIMON and SPECK Block Ciphers Flexible secure block ciphers, can perform well on any platform. 64-256 bits key size, bits block size SIMON is more hardware oriented, SPECK is more software oriented. Hardware implementation requires less gates than other algorithms.
  • 9. Stream Ciphers ISO/IEC 29192 specifies two stream ciphers: Enocoro: 80 or 128 bits key size Trivium: 80 bits key size Both of them are hardware oriented. The literatures do not really explain much about why these algorithms are considered ‘lightweight’ and do not compare them to other algorithms.
  • 10. Hash Functions ISO/IEC 29192 specifies three hash functions: PHOTON: permutation size bits and output size bits SPONGENT: permutation size bits and output size bits Lesamnta-LW: permutation size 384 bits and outputs size 256 bits
  • 11. SPONGENT Hash Function Five different hash sizes: 88, 128, 160, 224, 256 Three types pre-image and second pre-image security level: 1) Full pre-image and second pre-image security level 2) Reduced second pre-image security level 3) Reduced pre-image and second pre-image security level
  • 12. Lesamnta-LW Hash Function Lightweight 256 bits hash function Has collision, pre-image, and second pre-image security level of at least 2120. Hardware implementation only requires 8240 gates. Software implementation only requires 50 bytes of RAM and runs fast on short messages on 8- bit CPUs.
  • 13. Comparison Cryptography algorithms designed for IoT are ‘lightweight’ because: Designed specifically for constrained devices such as RFID tags and networked sensors (hardware oriented). Have several security levels that are sufficient to different types of applications. Designed to process only small amount of data. Existing popular cryptography algorithms are ‘heavy’ because: Designed as general-purpose algorithms. Generally software-oriented. High security level. Can process large amount of data.