Authors
William J Buchanan, Shancang Li, Rameez Asif
Publication date
2017/10/1
Source
Journal of Cyber Security Technology
Volume
1
Issue
3-4
Pages
187-201
Publisher
Taylor & Francis
Description
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks. Thus, lightweight cryptography methods are proposed to overcome many of the problems of conventional cryptography. This includes constraints related to physical size, processing requirements, memory limitation and energy drain. This paper outlines many of the techniques that are defined as replacements for conventional cryptography within an Internet of things space and discuss some trends in the design of lightweight algorithms.
Total citations
2017201820192020202120222023202413164142403514
Scholar articles
WJ Buchanan, S Li, R Asif - Journal of Cyber Security Technology, 2017