Lightweight cryptographic hash functions: design trends, comparative study, and future directions

The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives tha...

Full description

Saved in:
Bibliographic Details
Main Authors: Windarta, Susila, Suryadi, Suryadi, Ramli, Kalamullah, Pranggono, Bernardi, Gunawan, Teddy Surya
Format: Article
Language:English
English
Published: IEEE 2022
Subjects:
Online Access:http://irep.iium.edu.my/100339/7/100339_Lightweight%20cryptographic%20hash%20functions%20design%20trends_SCOPUS.pdf
http://irep.iium.edu.my/100339/8/100339_Lightweight%20cryptographic%20hash%20functions%20design%20trends.pdf
http://irep.iium.edu.my/100339/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9846993
https://doi.org/10.1109/ACCESS.2022.3195572
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives that provide data integrity services. However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. As a result, researchers have proposed various lightweight cryptographic hash function algorithms. In this paper, we discuss advanced lightweight cryptographic hash functions for highly constrained devices, categorize design trends, analyze cryptographic aspects and cryptanalytic attacks, and present a comparative analysis of different hardware and software implementations. In the final section of this paper, we highlight present research challenges and suggest future research topics related to the design of lightweight cryptographic hash functions.