Modern and Lightweight Componentbased Symmetric Cipher Algorithms
A Review
Abstract
Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats. Hence, cipher algorithms in the core of the information security process have more crucial role to play here, with continuous need for new and unorthodox designs to meet the increasing complexity of the applications environment that keep offering challenges to the current existing cipher algorithms. The aim of this review is to present symmetric cipher main components, the modern and lightweight symmetric cipher algorithms design based on the components that utilized in cipher design, highlighting the effect of each component and the essential component among them, how the modern cipher has modified to lightweight cipher by reducing the number and size of these components, clarify how these components give the strength for symmetric cipher versus asymmetric of cipher. Moreover, a new classification of cryptography algorithms to four categories based on four factors is presented. Finally, some modern and lightweight symmetric cipher algorithms are selected, presented with a comparison between them according to their components by taking into considerations the components impact on security, performance, and resource requirements.
Downloads
References
Afdhila, D., Nasution, S.M. and Azmi, F., 2016. Implementation of stream cipher Salsa20 algorithm to secure voice on push to talk application. In: 2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). IEEE, United States. pp.137141.
Alahdal, A., ALRummana, G.A., Shinde, G.N. and Deshmukh, N.K., 2020. NLBSIT: A new lightweight block cipher design for securing data in IOT devices. International Journal of Computer Sciences and Engineering, 8(10), p.13.
Aljazeera, K.R., Nandakumar, R. and Ershad, S.B., 2016. Design and characterization of L Block cryptocore. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, United States. pp.166172.
Amiri, M.A., Mahdavi, M. and Mirzakuchaki, S., 2009. QCA implementation of A5/1 stream cipher. In: 2009 Second International Conference on Advances in Circuits, Electronics and MicroElectronics. IEEE, United States. pp.4851.
Anand, A., Raj, A., Kohli, R. and Bibhu, V., 2016, Proposed symmetric key cryptography algorithm for data security. In: 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCSINBUSH). IEEE, United States. pp.159162.
Bagane, P. and Sirbi, D.K., 2021. Comparison between traditional cryptographic methods and genetic algorithm based method towards Cyber Security. International Journal of Advanced Research in Engineering and Technology (IJARET), 12(2), pp.676682.
Bansod, G., Pisharoty, N. and Patil, A., 2017. BORON: An ultralightweight and low power encryption design for pervasive computing. Frontiers of Information Technology and Electronic Engineering, 18(3), pp.317331.
Bardis, N.G., Markovskyy, A.P. and Andrikou, D.V., 2004. Method for designing pseudorandom binary sequences generators on Nonlinear Feedback Shift Register(NFSR). WSEAS Transactions on Communications, 3(2), pp.758763.
Basu, S., 2011. International data encryption algorithm (Idea)a typical illustration. Journal of Global Research in Computer Science, 2(7), pp.116118.
Beaulieu, R., Shors, D., Smith, J., TreatmanClark, S., Weeks, B. and Wingers, L., 2017. Notes on the design and analysis of SIMON and SPECK. Cryptology ePrint Archive.
Beaulieu, R., Shors, D., Smith, J., TreatmanClark, S., Weeks, B. and Wingers, L., 2013. Implementation and Performance of the Simon and Speck Lightweight Block Ciphers on ASICs. Unpublished Work.
Beaulieu, R., Shors, D., Smith, J., TreatmanClark, S., Weeks, B. and Wingers, L., 2015. The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference. pp.16.
Chen, S., Fan, Y., Sun, L., Fu, Y., Zhou, H., Li, Y., Wang, M., Wang, W. and Guo, C., 2022. SAND: An ANDRX Feistel lightweight block cipher supporting Sboxbased security evaluations. Designs, Codes and Cryptography, 90(1), pp.155198.
Chiadighikaobi, I.R. and Katuk, N., 2021. A scoping study on lightweight cryptography reviews in IOT. Baghdad Science Journal, 18(2), pp.9891000.
Chugunkov, I.V., Kliuchnikova, B.V., Riakhovskaia, I.S., Chernikova, E.A. and Chugunkov, V.I., 2020. Improvement of Pbox efficiency. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, United States. pp.274276.
Çoban, M., Karakoç, F. and Özen, M., 2016. Cryptanalysis of QTL Block cipher. In: International Workshop on Lightweight Cryptography for Security and Privacy. Springer, Cham. pp.6068.
De Canniere, C., Biryukov, A. and Preneel, B., 2006. An introduction to block cipher cryptanalysis. Proceedings of the IEEE, 94(2), pp.346356.
Ding, L., Liu, C., Zhang, Y. and Ding, Q., 2019. A new lightweight stream cipher based on chaos. Symmetry, 11(7), p.853.
Dreier, J., Hirschi, L., Radomirovic, S. and Sasse, R., 2018. Automated unbounded verification of stateful cryptographic protocols with exclusive OR. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, United States. pp.359373.
Dutta, I.K., Ghosh, B. and Bayoumi, M., 2019. Lightweight cryptography for internet of insecure things: A survey. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, United States. pp.04750481.
Easttom, W., 2021. Sbox design. In: Modern Cryptography. Springer, Cham. pp. 187204.
Ekdahl, P. and Johansson, T., 2003. Another attack on A5/1. IEEE Transactions on Information Theory, 49(1), pp.284289.
Forouzan, B.A. and Mukhopadhyay, D., 2015. Cryptography and Network Security. Vol. 12. McGraw Hill Education (India) Pvt Ltd., New York, NY, USA.
Fukushima, K., Xu, R., Kiyomoto, S. and Homma, N., 2017. Fault injection attack on Salsa20 and ChaCha and a lightweight countermeasure. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, United States. pp.10321037.
Ghosh, A., 2020. Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. International Research Journal of Engineering Technology, 7, pp.46564658.
Hamza, A. and Kumar, B., 2020, A review paper on DES, AES, RSA encryption standards. In: 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART). IEEE, United States. pp.333338.
Hasan, M.K., Shafiq, M., Islam, S., Pandey, B., Baker ElEbiary, Y.A., Nafi, N.S., Rodriguez, R.C. and Vargas, D.E., 2021. Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications. Complexity, 2021, 5540296.
Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I. and Manifavas, C., 2018. A review of lightweight block ciphers. Journal of Cryptographic Engineering, 8(2), pp.141184.
Hussain, I. and Shah, T., 2013. Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), pp.869904.
Hussaini, S., 2020. Cyber security in cloud using blowfish encryption. International Journal of Information Technology, 6(5),
Jassim, S.A. and Farhan, A.K., 2021. A survey on stream ciphers for constrained environments. In: 2021 1st Babylon International Conference on Information Technology and Science (BICITS). IEEE, United States. pp.228233.
Jiao, L., Hao, Y. and Feng, D., 2020. Stream cipher designs: A review. Science China Information Sciences, 63(3), pp.125.
Jindal, P. and Singh, B., 2015. RC4 encryptiona literature survey. Procedia Computer Science, 46, pp.697705.
Kitsos, P., Sklavos, N., Parousi, M. and Skodras, A.N., 2012. A comparative study of hardware architectures for lightweight block ciphers. Computers and Electrical Engineering, 38(1), pp.148160.
Kousalya, R. and Kumar, G.S., 2019. A survey of lightweight cryptographic algorithm for information security and hardware efficiency in resource constrained devices. In: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN). IEEE, United States. pp.15.
Kumar, D.S., Suneetha, C.H. and Chandrasekhar, A., 2012. A block cipher using rotation and logical XOR operations. International Journal of Computer Science Issues, 8, .
Kumar, P. and Rana, S.B., 2016. Development of modified AES algorithm for data security. Optik, 127(4), pp.23412345.
Lakhtaria, K.I., 2011. Protecting computer network with encryption technique: A study. In: International Conference on Ubiquitous Computing and Multimedia Applications. Springer, Berlin, Heidelberg. pp.381390.
Li, L., Liu, B. and Wang, H., 2016. QTL: A new ultralightweight block cipher. Microprocessors and Microsystems, 45, pp.4555.
Lu, M., Fan, A., Xu, J. and Shan, W., 2018. A compact, lightweight and lowcost 8bit datapath AES circuit for IOT applications in 28nm CMOS. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). IEEE, United States. pp.14641469.
MadarroCapó, E.J., LegónPérez, C.M., Rojas, O. and SosaGómez, G., 2021. Information theory based evaluation of the RC4 stream cipher outputs. Entropy, 23(7), p.896.
Mathew, S., Satpathy, S., Suresh, V., Anders, M., Kaul, H., Agarwal, A., Hsu, S., Chen, G. and Krishnamurthy, R., 2015. 340 mv1.1 v, 289 gbps/w, 2090gate nanoaes hardware accelerator with areaoptimized encrypt/decrypt GF (2 4) 2 polynomials in 22 nm trigate CMOS. IEEE Journal of SolidState Circuits, 50(4), pp.10481058.
Ménétrey, J., Pasin, M., Felber, P. and Schiavoni, V., 2021. Twine: An embedded trusted runtime for webassembly. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE). IEEE, United States. pp.205216.
Mewada, S., Sharma, P. and Gautam, S.S., 2016. Classification of efficient symmetric key cryptography algorithms. International Journal of Computer Science and Information Security, 14(2), p.105.
Mohandas, N.A., Swathi, A., Abhijith, R., Nazar, A. and Sharath, G., 2020. A4: A lightweight stream cipher. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES). IEEE, United States. pp.573577.
Muchsin, H.N., Sari, D.E. and Rachmawanto, E.H., 2019. Text encryption using extended bit circular shift cipher. In: 2019 Fourth International Conference on Informatics and Computing (ICIC). IEEE, United States. pp.81388143.
Naser, N.M. and Naif, J.R., 2022. A systematic review of ultralightweight encryption algorithms. International Journal of Nonlinear Analysis and Applications, 13(1), pp.38253851.
Pachghare, V.K., 2019. Cryptography and Information Security. PHI Learning Pvt. Ltd., New Delhi.
Patil, P., Narayankar, P., Narayan, D.G. and Meena, S.M., 2016. A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Procedia Computer Science, 78, pp.617624.
Patil, S. and Bhusari, V., 2014. An enhancement in international data encryption algorithm for increasing security. International Journal of Application or Innovation in Engineering and Management, 3(8), pp.6470.
Philip, M.A., 2017. A survey on lightweight ciphers for IOT devices. In: 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy). IEEE, United States. pp.14.
Philip, M.A., Vaithiyanathan, V. and Jain, K., 2018. Implementation analysis of rectangle cipher and its variant. In: 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT). IEEE, United States. pp.474479.
Poschmann, A., Leander, G., Schramm, K. and Paar, C., 2006. A Family of LightWeight Block Ciphers Based on DES Suited for RFID Applications. Vol. 6. Workshop on RFID SecurityRFIDSec.
Qadir, A.M. and Nurhayat, V., 2019. A review paper on cryptography. International Symposium on Digital Forensics and Security (ISDFS). IEEE, United States. pp.16.
Qiao, Z., El Assad, S. and Taralova, I., 2020. Design of secure cryptosystem based on chaotic components and AES SBox. AEUInternational Journal of Electronics and Communications, 121, p.153205.
Raza, A.R., Mahmood, K., Amjad, M.F., Abbas, H. and Afzal, M., 2020. On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages. Future Generation Computer Systems, 104, pp.4359.
Sadkhan, S.B. and Jawad, N.H., 2015. Simulink based implementation of developed A5/1 stream cipher cryptosystems. Procedia Computer Science, 65, pp.350357.
Sallam, S. and Beheshti, B.D., 2018. A survey on lightweight cryptographic algorithms. In: TENCON 20182018 IEEE Region 10 Conference. IEEE, United States. pp.17841789.
Schneier, B., 1993. Description of a new variablelength key, 64bit block cipher (Blowfish). In: International Workshop on Fast Software Encryption. Springer, Berlin, Heidelberg. pp.191204.
Sharma, D.K., Singh, N.C., Noola, D.A., Doss, A.N. and Sivakumar, J., 2022. A review on various cryptographic techniques and algorithms. Materials Today: Proceedings, 51, pp.104109.
Shrivastava, N., Singh, P. and Acharya, B., 2020. Efficient hardware implementations of QTL cipher for RFID applications. International Journal of High Performance Systems Architecture, 9(1), pp.110.
Sliman, L., Omrani, T., Tari, Z., Samhat, A.E. and Rhouma, R., 2021. Towards an ultralightweight block ciphers for Internet of Things. Journal of Information Security and Applications, 61, p.102897.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), pp.215225.
Stallings, W., Brown, L., Bauer, M.D. and Howard, M., 2012. Computer Security: Principles and Practice. Vol. 2. Pearson, Upper Saddle River.
Sutar, S.A., 2018. Differential power attack analysis of ultralightweight block cipher BORON. In: 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, United States. pp. 365370.
Suzaki, T., Minematsu, K., Morioka, S. and Kobayashi, E., 2011. Twine: A Lightweight, Versatile Block Cipher. Vol. 2011. In: ECRYPT Workshop on Lightweight Cryptography.
Szaban, M. and Seredynski, F., 2011. Designing cryptographically strong Sboxes with use of ID cellular automata. Journal of Cellular Automata, 6(1),.
Wahid, M.N., Ali, A., Esparham, B. and Marwan, M., 2018. A comparison of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish for guessing attacks prevention. Journal Computer Science Applications and Information Technology, 3(2), pp.17.
Wang, S., Liu, M., Lin, D. and Ma, L., 2019. Fast Correlation Attacks on Grain Like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruitv2 and Fruit80. Cryptology ePrint Archive.
Wang, S., Liu, M., Lin, D. and Ma, L., 2022. On grainlike small state stream ciphers against fast correlation attacks: Cryptanalysis of plantlet, fruitv2 and fruit80. The Computer Journal, bxac016.
Wu, W. and Zhang, L., 2011. L Block: A lightweight block cipher. In: International Conference on Applied Cryptography and Network Security. Springer, Berlin, Heidelberg. pp.327344.
Yihan, W. and Yongzhen, L., 2021. Improved design of DES algorithm based on symmetric encryption algorithm. In: 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA). IEEE, United States. pp. 220223.
Yoshikawa, M., Nozaki, Y. and Asahi, K., 2016. Electromagnetic analysis attack for a lightweight block cipher TWINE. In: 2016 IEEE/ACES International Conference on Wireless Information Technology and Systems (ICWITS) and Applied Computational Electromagnetics (ACES). IEEE, United States. pp.12.
Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B. and Verbauwhede, I., 2015. RECTANGLE: A bitslice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 58(12), pp.115.
Zhao, W., Ha, Y. and Alioto, M., 2015. AES architectures for minimumenergy operation and silicon demonstration in 65nm with lowest energy per encryption. In: 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, United States. pp.23492352.
Copyright (c) 2022 Samar A. Qassir, Methaq T. Gaata, Ahmed T. Sadiq
This work is licensed under a Creative Commons AttributionNonCommercialShareAlike 4.0 International License.
Authors who choose to publish their work with Aro agree to the following terms:

Authors retain the copyright to their work and grant the journal the right of first publication. The work is simultaneously licensed under a Creative Commons Attribution License [CC BYNCSA 4.0]. This license allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.

Authors have the freedom to enter into separate agreements for the nonexclusive distribution of the journal's published version of the work. This includes options such as posting it to an institutional repository or publishing it in a book, as long as proper acknowledgement is given to its initial publication in this journal.

Authors are encouraged to share and post their work online, including in institutional repositories or on their personal websites, both prior to and during the submission process. This practice can lead to productive exchanges and increase the visibility and citation of the published work.
By agreeing to these terms, authors acknowledge the importance of open access and the benefits it brings to the scholarly community.