Recent Advances and Trends in Lightweight Cryptography for IoT Security Nilupulee A. Gunathilake, Ahmed Al-Dubai, William J. Buchanan School of Computing, Edinburgh Napier University, United Kingdom nilupulee.gunathilake@napier.ac.uk, a.al-dubai@napier.ac.uk, b.buchanan@napier.ac.uk Abstract—Lightweight cryptography is a novel diversion from conventional cryptography to minimise its high level of resource requirements, thus it would impeccably fit in the internet-of- things (IoT) environment. The IoT platform is constrained in terms of physical size, internal capacity, other storage allocations like RAM/ROM and data rates. The devices are often battery powered, hence maintenance of the charged energy at least for a few years is essential. However, provision of sufficient security is challenging because the existing cryptographic methods are too heavy to adopt in the IoT. Consequently, an interest arose in the recent past to construct new cryptographic algorithms in a lightweight scale, but the attempts are still struggling to gain robustness against improved IoT threats and hazards. There exists a lack of literature studies to offer overall and up- to-date knowledge on lightweight cryptography. Therefore, this effort is to bridge the areas in the subject by summarising the content we explored during our complete survey recently. This work contains the development of lightweight cryptographic al- gorithms, its current advancements and futuristic enhancements. In contrast, this covers the history, parametric limitations of the invented methods, research progresses of cryptology as well as cryptanalysis. Index Terms—IoT, lightweight cryptography, side-channel at- tack I. I NTRODUCTION In modern cryptography, AES (Advanced Encryption Stan- dard), DES (Data Encryption Standard) and RSA (Rivest- Shamir-Adleman) are effective in general purpose comput- ing due to their compatibility with the resource require- ments, i.e., high-end processors, large internal capacities in Giga/TeraByte, etc. The nature of the internet-of-things (IoT) is quite distinct because of its constrained resource management, i.e., low-end processors, small data rates in kbps, etc. Therefore, execution of the conventional methods on IoT devices would cause degradation of device performance and/or malfunction over the overall application deliverables, i.e., fast battery drainage, high latency, etc. Thus, a whole new perspective of cryptographic vision towards lightweight inventions for IoT security is crucial. The interest in lightweight cryptography has been there in research for about ten years now. Nevertheless, the con- ventional cryptography also initially began on a lightweight scale a few decades back, compatible with the very first microprocessor which was 4b, i.e., A5/1, CMEA, DSC, etc [1]. Each of those method was either broken or reverse engineered eventually, due to simplicity of their operations. IoT threats and hazards are probably much more advanced and sophisticated, hence the aim must be increased security for decreased resource requirements. In contrast, safety as- surance over IoT transmission technologies/protocols is an unavoidable necessity for accurate encryption/decryption and encoding/decoding, i.e., ZigBee, BLE, LoRaWAN, etc. Lightweight cryptography is categorised as symmetric, asymmetric and hash. In the present, many symmetric and hash implementations are available to try in practical systems, i.e., PRESENT, KLEIN, PHOTON, etc., whereas a few asym- metric algorithms are accessible in comparison, i.e., elliptic light (ELLI) derived from elliptic curve cryptography (ECC). Because of the difficulties associated with traditional public key methods in such a constrained platform, it is extremely challenging to innovate ways to gain asymmetric adaptability. Even so, researchers continue to conduct asymmetric ap- proaches in order to provide a better quality-of-service (QoS) via post-quantum 1 as well as lattice-based 2 cryptography, i.e., cryptoGPS, ALIKE, etc. The predictions in 2000s were that it would be problematic to implement lightweight hash functions, but hybrid tech- niques via a combination of conventional hash methods and lightweight block ciphers would be a solution [2]. However, several lightweight hash inventions have been introduced the- oretically later, yet their performance to be verified practically. There has been an immense attention given to block ciphers from the beginning, and stream ciphers became trending after a while. Moreover, sponge-based (SP) hash/message authentication code (MAC), individual authenticated ciphers (authenticated encryption - AE), SP based AE and block cipher (BC) based AE are available in academic and industrial researches [3]. Fig.1 illustrates the scale of the lightweight algorithms published from 1994 – 2019. Lightweight cryptography is subdivided considering its ap- plications/limitations as follows [4]; Ultra-lightweight: Tailored in specific areas of the al- gorithm, i.e., selected microcontrollers (μC)/cipher sec- tions/operations – PRESENT, Grain (low gate count in hardware), Quarma (low latency in hardware) and Chaskey (high speed on μCs) Ubiquitous lightweight: Compatible with wide variety of platforms, i.e., 8b to 32b μCs – Ascon, GIMLI and 1 cryptographic primitives that involve quantum phenomena 2 cryptographic primitives that involve lattices 978-3-903176-31-7 © 2020 IFIP