Indonesian Journal of Electrical Engineering and Computer Science Vol. 20, No. 2, November 2020, pp. 894~902 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v20.i2.pp 894-902 894 Journal homepage: http://ijeecs.iaescore.com Compare encryption performance across devices to ensure the security of the IOT A.YU. Pyrkova, ZH.E. Temirbekova Faculty of Information Technology, Al-Farabi Kazakh National University, Kazakhstan Article Info ABSTRACT Article history: Received Mar 3, 2020 Revised May 1, 2020 Accepted May 15, 2020 The Internet of Things (IoT) combines many devices with various platforms, computing capabilities and functions. The heterogeneity of the network and the ubiquity of IoT devices place increased demands on security and privacy protection. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, but at the same time they must be effective enough to be implemented on devices with disabilities. One of the limited devices are microcontrollers and smart cards. This paper presents the performance and memory limitations of modern cryptographic primitives and schemes on various types of devices that can be used in IoT. In this article, we provided a detailed assessment of the performance of the most commonly used cryptographic algorithms on devices with disabilities that often appear on IoT networks. We relied on the most popular open source microcontroller development platform, on the mbed platform. To provide a data protection function, we used cryptography asymmetric fully homomorphic encryption in the binary ring and symmetric cryptography AES 128 bit. In addition, we compared run-time encryption and decryption on a personal computer (PC) with Windows 7, the Bluetooth Low Energy (BLE) Nano Kit microcontroller, the BLE Nano 1.5, and the smartcard ML3-36k-R1. Keywords: BLE nano microcontroller mbed platform Homomorphic encryption in a binary number ring Smartcard ML3-36k-R1 cryptography Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Temirbekova Zhanerke Erlanovna, Faculty of Information Technology, Al-Farabi Kazakh National University, Al-Farabi Avenue, 71, Almaty, Kazakhstan. Email: temyrbekovazhanerke2@gmail.com 1. INTRODUCTION The Internet of Things (IoT) has tightly entered our lives and billions of people around the world. However, an increase in the number of connected devices leads to an increase in security risks: from physical harm to people to downtime and damage to equipment - it can even be pipelines, blast furnaces and plants for generating electricity. Since a number of such IoT facilities and systems have already been attacked and significant damage has been done, ensuring their protection comes to the fore. As IoT technologies evolve, the number of devices connected to each other is also increasing. These devices provide an unprecedented ability to identify and control the environment. Sensor data can be transferred between devices via remote data to the analyzed center. The security of this technology is still a big question, because it is still unsafe by nature. For embedded systems, this is not a new security issue [1-3]. Security issues such as eavesdropping can illegally affect people’s daily activities, even a -legitimate subject can collect data without user consent. The easiest way to ensure data privacy is to apply encryption to the data [4, 5]. The IoT, like any rapidly developing technology, is experiencing a number of “growth diseases”, among which the most serious is the security problem. The more “smart” devices are connected to the network, the higher the risks associated with unauthorized access to the IoT system and the use of its capabilities by attackers.