Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques
DOI:
https://doi.org/10.21015/vtse.v13i1.2050Abstract
Cryptography is used to make data and information transmission and computational systems secure over the networks by using mathematical and scientific techniques. The cryptographic algorithm should fulfil the conditions of authentication, confidentiality, integrity and reliability. In today’s era, where digital communication and data storage is increasing day by day and the data leakage, breaches and attacks are continuously rising. The increase in need of strong and secure cryptography algorithms to protect user information that ensures the integrity and confidentiality of data. The existing symmetric cryptographic algorithms like AES or DES, can provide strong security but they have very complex implementations and requires high computational resources. The aim of this paper is to provide a study for the research done in the field of cryptography, cryptographic techniques and to propose and developed a light weight symmetric cryptographic algorithm using different fundamental cryptographic techniques that is secure and fulfils the conditions of authentication, confidentiality, integrity and reliability.
References
Katz J, Lindell Y. Introduction to modern cryptography: principles and protocols. Boca Raton: Chapman and Hall/CRC; 2007.
Sharma N, et al. A review of information security using cryptography technique. Int J Adv Res Comput Sci. 2017;8(4).
Al-Sabaawi A. Cryptanalysis of classic ciphers: Methods implementation survey. In: 2021 Int Conf Intell Technol (CONIT). IEEE; 2021. p. 1–6.
Sankhyan B, Baliyan A, Kumar A. Review on symmetric and asymmetric cryptography. Int J Res Appl Sci Eng Technol. 2024;12:2934–40.
Kumar R, Yadav D. Cryptographic algorithms: Current status and future directions. Eur Chem Bull. 2023 Sep.
Tushar AS, Mishra A. Cryptographic algorithm for enhancing data security: A theoretical approach. Int J Eng Res Technol. 2021;10(3):274–7.
Sasikala K. Comparative study of cryptographic algorithms. Int J Eng Res Technol. 2020;9.
Naser S. Cryptography: from the ancient history to now, its applications and a new complete numerical model. Int J Math Stat Stud. 2021;9(3):11–30.
Salami Y, Khajevand V, Zeinali E. Cryptographic algorithms: A review of the literature, weaknesses and open challenges. J Comput Robot. 2023;16(2):46–56.
Banerjee S. Exploring cryptographic algorithms: Techniques, applications, and innovations. Int J Adv Res Sci Commun Technol. 2024:607–20.
Panhwar MA, Khuhro SA, Panhwar G, Memon KA. SACA: A study of symmetric and asymmetric cryptographic algorithms. Int J Comput Sci Netw Secur. 2019;19(1):48–55.
Thirupalu U, Reddy EK. Performance analysis of cryptographic algorithms in the information security. Int J Eng Res Technol. 2020;8(2):1–6.
Iuorio AF, Visconti A. Understanding optimizations and measuring performances of PBKDF2. In: 2nd Int Conf Wirel Intell Distrib Environ Commun (WIDECOM 2019). Springer; 2019. p. 101–14.
Singh B, Jesi D. Safe Vault: A password manager. Int J Eng Appl Sci Technol. 2022;6:93–7.
Mustafa NAA. Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2. Wasit J Eng Sci. 2024;12(2):60–70.
Lee C, Lee H. A password stretching method using user specific salts. In: Proc 16th Int Conf World Wide Web. 2007. p. 1215–6.
Agrawal E, Pal PR. A secure and fast approach for encryption and decryption of message communication. Int J Eng Sci. 2017;11481.
Turan MS, Barker E, Burr W, Chen L. Recommendation for password-based key derivation. NIST Spec Publ. 2010;800:132.
Visconti A, Bossi S, Ragab H, Calò A. On the weaknesses of PBKDF2. In: Cryptol Netw Secur: 14th Int Conf, CANS 2015, Marrakesh, Morocco, Proc 14. Springer; 2015. p. 119–26.
Dell’Amico M, Michiardi P, Roudier Y. Password strength: An empirical analysis. In: Proc IEEE INFOCOM 2010. IEEE; 2010. p. 1–9.
Chanda K. Password security: an analysis of password strengths and vulnerabilities. Int J Comput Netw Inf Secur. 2016;8(7):23.
Joshi A, Wazid M, Goudar R. An efficient cryptographic scheme for text message protection against brute force and cryptanalytic attacks. Procedia Comput Sci. 2015;48:360–6.
Nadeem A, Javed MY. A performance comparison of data encryption algorithms. In: 2005 Int Conf Inf Commun Technol. IEEE; 2005. p. 84–9.
Gupta A, Walia NK. Cryptography algorithms: a review. Int J Eng Dev Res. 2014;2(2):1667–72.
Zhong Y, Gu J. Lightweight block ciphers for resource-constrained environments: A comprehensive survey. Future Gener Comput Syst. 2024.
Pan Y. The scope of application of letter frequency analysis in substitution cipher. J Phys Conf Ser. 2022;2386:012015.
Verma R, Kumari A, Anand A, Yadavalli VSS. Revisiting shift cipher technique for amplified data security. J Comput Cogn Eng. 2024;3(1):8–14.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY