Modern and Lightweight Component-based Symmetric Cipher Algorithms

A Review

Keywords: Information security, Lightweight Symmetric Cipher, Modern Symmetric Cipher, Symmetric cipher components


Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats. Hence, cipher algorithms in the core of the information security process have more crucial role to play here, with continuous need for new and unorthodox designs to meet the increasing complexity of the applications environment that keep offering challenges to the current existing cipher algorithms. The aim of this review is to present symmetric cipher main components, the modern and lightweight symmetric cipher algorithms design based on the components that utilized in cipher design, highlighting the effect of each component and the essential component among them, how the modern cipher has modified to lightweight cipher by reducing the number and size of these components, clarify how these components give the strength for symmetric cipher versus asymmetric of cipher. Moreover, a new classification of cryptography algorithms to four categories based on four factors is presented. Finally, some modern and lightweight symmetric cipher algorithms are selected, presented with a comparison between them according to their components by taking into considerations the components impact on security, performance, and resource requirements.


Download data is not yet available.

Author Biographies

Samar A. Qassir, Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq

Samar A. Qassir is a Lecturer at the Department of Computer Science, College of Science, Mustansiriyah University. She got the B.Sc. degree in Computer Science, the M.Sc. degree in Computer Science and recently she is a Ph.D. student in Computer Science.

Methaq T. Gaata, Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq

Methaq T. Gaata is Professor at the College of Science, Mustansiriyah University, Iraq. He holds a Ph.D. degree in Computer Science. His research areas are information hiding, multimedia processing, biometrics, pattern recognition and computer networks.

Ahmed T. Sadiq, Department of Computer Science, University of Technology - Iraq, Baghdad, Iraq

Ahmed T. Sadiq is a Professor in AI. He received the B.Sc., M.Sc. and Ph. D. degrees in Computer Science from the University of Technology. His research interests are in artificial intelligence, data security, patterns recognition and data mining.


Afdhila, D., Nasution, S.M. and Azmi, F., 2016. Implementation of stream cipher Salsa20 algorithm to secure voice on push to talk application. In: 2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). IEEE, United States. pp.137-141.

Alahdal, A., AL-Rummana, G.A., Shinde, G.N. and Deshmukh, N.K., 2020. NLBSIT: A new lightweight block cipher design for securing data in IOT devices. International Journal of Computer Sciences and Engineering, 8(10), p.13.

Aljazeera, K.R., Nandakumar, R. and Ershad, S.B., 2016. Design and characterization of L Block cryptocore. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, United States. pp.166-172.

Amiri, M.A., Mahdavi, M. and Mirzakuchaki, S., 2009. QCA implementation of A5/1 stream cipher. In: 2009 Second International Conference on Advances in Circuits, Electronics and Micro-Electronics. IEEE, United States. pp.48-51.

Anand, A., Raj, A., Kohli, R. and Bibhu, V., 2016, Proposed symmetric key cryptography algorithm for data security. In: 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH). IEEE, United States. pp.159-162.

Bagane, P. and Sirbi, D.K., 2021. Comparison between traditional cryptographic methods and genetic algorithm based method towards Cyber Security. International Journal of Advanced Research in Engineering and Technology (IJARET), 12(2), pp.676-682.

Bansod, G., Pisharoty, N. and Patil, A., 2017. BORON: An ultra-lightweight and low power encryption design for pervasive computing. Frontiers of Information Technology and Electronic Engineering, 18(3), pp.317-331.

Bardis, N.G., Markovskyy, A.P. and Andrikou, D.V., 2004. Method for designing pseudorandom binary sequences generators on Nonlinear Feedback Shift Register(NFSR). WSEAS Transactions on Communications, 3(2), pp.758-763.

Basu, S., 2011. International data encryption algorithm (Idea)-a typical illustration. Journal of Global Research in Computer Science, 2(7), pp.116-118.

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B. and Wingers, L., 2017. Notes on the design and analysis of SIMON and SPECK. Cryptology ePrint Archive.

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B. and Wingers, L., 2013. Implementation and Performance of the Simon and Speck Lightweight Block Ciphers on ASICs. Unpublished Work.

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B. and Wingers, L., 2015. The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference. pp.1-6.

Chen, S., Fan, Y., Sun, L., Fu, Y., Zhou, H., Li, Y., Wang, M., Wang, W. and Guo, C., 2022. SAND: An AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. Designs, Codes and Cryptography, 90(1), pp.155-198.

Chiadighikaobi, I.R. and Katuk, N., 2021. A scoping study on lightweight cryptography reviews in IOT. Baghdad Science Journal, 18(2), pp.989-1000.

Chugunkov, I.V., Kliuchnikova, B.V., Riakhovskaia, I.S., Chernikova, E.A. and Chugunkov, V.I., 2020. Improvement of P-box efficiency. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, United States. pp.274-276.

Çoban, M., Karakoç, F. and Özen, M., 2016. Cryptanalysis of QTL Block cipher. In: International Workshop on Lightweight Cryptography for Security and Privacy. Springer, Cham. pp.60-68.

De Canniere, C., Biryukov, A. and Preneel, B., 2006. An introduction to block cipher cryptanalysis. Proceedings of the IEEE, 94(2), pp.346-356.

Ding, L., Liu, C., Zhang, Y. and Ding, Q., 2019. A new lightweight stream cipher based on chaos. Symmetry, 11(7), p.853.

Dreier, J., Hirschi, L., Radomirovic, S. and Sasse, R., 2018. Automated unbounded verification of stateful cryptographic protocols with exclusive OR. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, United States. pp.359-373.

Dutta, I.K., Ghosh, B. and Bayoumi, M., 2019. Lightweight cryptography for internet of insecure things: A survey. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, United States. pp.0475-0481.

Easttom, W., 2021. S-box design. In: Modern Cryptography. Springer, Cham. pp. 187-204.

Ekdahl, P. and Johansson, T., 2003. Another attack on A5/1. IEEE Transactions on Information Theory, 49(1), pp.284-289.

Forouzan, B.A. and Mukhopadhyay, D., 2015. Cryptography and Network Security. Vol. 12. McGraw Hill Education (India) Pvt Ltd., New York, NY, USA.

Fukushima, K., Xu, R., Kiyomoto, S. and Homma, N., 2017. Fault injection attack on Salsa20 and ChaCha and a lightweight countermeasure. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, United States. pp.1032-1037.

Ghosh, A., 2020. Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. International Research Journal of Engineering Technology, 7, pp.4656-4658.

Hamza, A. and Kumar, B., 2020, A review paper on DES, AES, RSA encryption standards. In: 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART). IEEE, United States. pp.333-338.

Hasan, M.K., Shafiq, M., Islam, S., Pandey, B., Baker El-Ebiary, Y.A., Nafi, N.S., Rodriguez, R.C. and Vargas, D.E., 2021. Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications. Complexity, 2021, 5540296.

Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I. and Manifavas, C., 2018. A review of lightweight block ciphers. Journal of Cryptographic Engineering, 8(2), pp.141-184.

Hussain, I. and Shah, T., 2013. Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), pp.869-904.

Hussaini, S., 2020. Cyber security in cloud using blowfish encryption. International Journal of Information Technology, 6(5),

Jassim, S.A. and Farhan, A.K., 2021. A survey on stream ciphers for constrained environments. In: 2021 1st Babylon International Conference on Information Technology and Science (BICITS). IEEE, United States. pp.228-233.

Jiao, L., Hao, Y. and Feng, D., 2020. Stream cipher designs: A review. Science China Information Sciences, 63(3), pp.1-25.

Jindal, P. and Singh, B., 2015. RC4 encryption-a literature survey. Procedia Computer Science, 46, pp.697-705.

Kitsos, P., Sklavos, N., Parousi, M. and Skodras, A.N., 2012. A comparative study of hardware architectures for lightweight block ciphers. Computers and Electrical Engineering, 38(1), pp.148-160.

Kousalya, R. and Kumar, G.S., 2019. A survey of light-weight cryptographic algorithm for information security and hardware efficiency in resource constrained devices. In: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN). IEEE, United States. pp.1-5.

Kumar, D.S., Suneetha, C.H. and Chandrasekhar, A., 2012. A block cipher using rotation and logical XOR operations. International Journal of Computer Science Issues, 8, .

Kumar, P. and Rana, S.B., 2016. Development of modified AES algorithm for data security. Optik, 127(4), pp.2341-2345.

Lakhtaria, K.I., 2011. Protecting computer network with encryption technique: A study. In: International Conference on Ubiquitous Computing and Multimedia Applications. Springer, Berlin, Heidelberg. pp.381-390.

Li, L., Liu, B. and Wang, H., 2016. QTL: A new ultra-lightweight block cipher. Microprocessors and Microsystems, 45, pp.45-55.

Lu, M., Fan, A., Xu, J. and Shan, W., 2018. A compact, lightweight and low-cost 8-bit datapath AES circuit for IOT applications in 28nm CMOS. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). IEEE, United States. pp.1464-1469.

Madarro-Capó, E.J., Legón-Pérez, C.M., Rojas, O. and Sosa-Gómez, G., 2021. Information theory based evaluation of the RC4 stream cipher outputs. Entropy, 23(7), p.896.

Mathew, S., Satpathy, S., Suresh, V., Anders, M., Kaul, H., Agarwal, A., Hsu, S., Chen, G. and Krishnamurthy, R., 2015. 340 mv-1.1 v, 289 gbps/w, 2090-gate nanoaes hardware accelerator with area-optimized encrypt/decrypt GF (2 4) 2 polynomials in 22 nm tri-gate CMOS. IEEE Journal of Solid-State Circuits, 50(4), pp.1048-1058.

Ménétrey, J., Pasin, M., Felber, P. and Schiavoni, V., 2021. Twine: An embedded trusted runtime for webassembly. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE). IEEE, United States. pp.205-216.

Mewada, S., Sharma, P. and Gautam, S.S., 2016. Classification of efficient symmetric key cryptography algorithms. International Journal of Computer Science and Information Security, 14(2), p.105.

Mohandas, N.A., Swathi, A., Abhijith, R., Nazar, A. and Sharath, G., 2020. A4: A lightweight stream cipher. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES). IEEE, United States. pp.573-577.

Muchsin, H.N., Sari, D.E. and Rachmawanto, E.H., 2019. Text encryption using extended bit circular shift cipher. In: 2019 Fourth International Conference on Informatics and Computing (ICIC). IEEE, United States. pp.8138-8143.

Naser, N.M. and Naif, J.R., 2022. A systematic review of ultra-lightweight encryption algorithms. International Journal of Nonlinear Analysis and Applications, 13(1), pp.3825-3851.

Pachghare, V.K., 2019. Cryptography and Information Security. PHI Learning Pvt. Ltd., New Delhi.

Patil, P., Narayankar, P., Narayan, D.G. and Meena, S.M., 2016. A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Procedia Computer Science, 78, pp.617-624.

Patil, S. and Bhusari, V., 2014. An enhancement in international data encryption algorithm for increasing security. International Journal of Application or Innovation in Engineering and Management, 3(8), pp.64-70.

Philip, M.A., 2017. A survey on lightweight ciphers for IOT devices. In: 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy). IEEE, United States. pp.1-4.

Philip, M.A., Vaithiyanathan, V. and Jain, K., 2018. Implementation analysis of rectangle cipher and its variant. In: 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT). IEEE, United States. pp.474-479.

Poschmann, A., Leander, G., Schramm, K. and Paar, C., 2006. A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications. Vol. 6. Workshop on RFID Security-RFIDSec.

Qadir, A.M. and Nurhayat, V., 2019. A review paper on cryptography. International Symposium on Digital Forensics and Security (ISDFS). IEEE, United States. pp.1-6.

Qiao, Z., El Assad, S. and Taralova, I., 2020. Design of secure cryptosystem based on chaotic components and AES S-Box. AEU-International Journal of Electronics and Communications, 121, p.153205.

Raza, A.R., Mahmood, K., Amjad, M.F., Abbas, H. and Afzal, M., 2020. On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages. Future Generation Computer Systems, 104, pp.43-59.

Sadkhan, S.B. and Jawad, N.H., 2015. Simulink based implementation of developed A5/1 stream cipher cryptosystems. Procedia Computer Science, 65, pp.350-357.

Sallam, S. and Beheshti, B.D., 2018. A survey on lightweight cryptographic algorithms. In: TENCON 2018-2018 IEEE Region 10 Conference. IEEE, United States. pp.1784-1789.

Schneier, B., 1993. Description of a new variable-length key, 64-bit block cipher (Blowfish). In: International Workshop on Fast Software Encryption. Springer, Berlin, Heidelberg. pp.191-204.

Sharma, D.K., Singh, N.C., Noola, D.A., Doss, A.N. and Sivakumar, J., 2022. A review on various cryptographic techniques and algorithms. Materials Today: Proceedings, 51, pp.104-109.

Shrivastava, N., Singh, P. and Acharya, B., 2020. Efficient hardware implementations of QTL cipher for RFID applications. International Journal of High Performance Systems Architecture, 9(1), pp.1-10.

Sliman, L., Omrani, T., Tari, Z., Samhat, A.E. and Rhouma, R., 2021. Towards an ultra-lightweight block ciphers for Internet of Things. Journal of Information Security and Applications, 61, p.102897.

Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), pp.215-225.

Stallings, W., Brown, L., Bauer, M.D. and Howard, M., 2012. Computer Security: Principles and Practice. Vol. 2. Pearson, Upper Saddle River.

Sutar, S.A., 2018. Differential power attack analysis of ultra-lightweight block cipher BORON. In: 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, United States. pp. 365-370.

Suzaki, T., Minematsu, K., Morioka, S. and Kobayashi, E., 2011. Twine: A Lightweight, Versatile Block Cipher. Vol. 2011. In: ECRYPT Workshop on Lightweight Cryptography.

Szaban, M. and Seredynski, F., 2011. Designing cryptographically strong S-boxes with use of ID cellular automata. Journal of Cellular Automata, 6(1),.

Wahid, M.N., Ali, A., Esparham, B. and Marwan, M., 2018. A comparison of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish for guessing attacks prevention. Journal Computer Science Applications and Information Technology, 3(2), pp.1-7.

Wang, S., Liu, M., Lin, D. and Ma, L., 2019. Fast Correlation Attacks on Grain- Like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. Cryptology ePrint Archive.

Wang, S., Liu, M., Lin, D. and Ma, L., 2022. On grain-like small state stream ciphers against fast correlation attacks: Cryptanalysis of plantlet, fruit-v2 and fruit-80. The Computer Journal, bxac016.

Wu, W. and Zhang, L., 2011. L Block: A lightweight block cipher. In: International Conference on Applied Cryptography and Network Security. Springer, Berlin, Heidelberg. pp.327-344.

Yihan, W. and Yongzhen, L., 2021. Improved design of DES algorithm based on symmetric encryption algorithm. In: 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA). IEEE, United States. pp. 220-223.

Yoshikawa, M., Nozaki, Y. and Asahi, K., 2016. Electromagnetic analysis attack for a lightweight block cipher TWINE. In: 2016 IEEE/ACES International Conference on Wireless Information Technology and Systems (ICWITS) and Applied Computational Electromagnetics (ACES). IEEE, United States. pp.1-2.

Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B. and Verbauwhede, I., 2015. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 58(12), pp.1-15.

Zhao, W., Ha, Y. and Alioto, M., 2015. AES architectures for minimum-energy operation and silicon demonstration in 65nm with lowest energy per encryption. In: 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, United States. pp.2349-2352.

How to Cite
Qassir, S. A., Gaata, M. T. and Sadiq, A. T. (2022) “Modern and Lightweight Component-based Symmetric Cipher Algorithms: A Review”, ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 10(2), pp. 152-168. doi: 10.14500/aro.11007.
Review Articles