CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Comparative Analysis of Cryptography Library in IoT

by Uday Kumar, Tuhin Borgohain, Sugata Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 10
Year of Publication: 2015
Authors: Uday Kumar, Tuhin Borgohain, Sugata Sanyal
10.5120/20779-3338

Uday Kumar, Tuhin Borgohain, Sugata Sanyal . Comparative Analysis of Cryptography Library in IoT. International Journal of Computer Applications. 118, 10 ( May 2015), 5-10. DOI=10.5120/20779-3338

@article{ 10.5120/20779-3338,
author = { Uday Kumar, Tuhin Borgohain, Sugata Sanyal },
title = { Comparative Analysis of Cryptography Library in IoT },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 10 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number10/20779-3338/ },
doi = { 10.5120/20779-3338 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:17.772342+05:30
%A Uday Kumar
%A Tuhin Borgohain
%A Sugata Sanyal
%T Comparative Analysis of Cryptography Library in IoT
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 10
%P 5-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cryptography libraries specifically aimed for application in the field of Internet of Things. The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various cryptography libraries and the comparative analysis of their features in IoT.

References
  1. Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, and Leif Uhsadel. "A survey of lightweight-cryptography implementations". IEEE Design & Test of Computers 24, no. 6 (2007): 522-533.
  2. Dai, Wei. "Crypto++ Library 5. 6. 0. " http:/www. cryptopp. com (2009).
  3. Sandipan Dey, Hameed Al-Qaheri, and Sugata Sanyal. "Embedding Secret Data in Html Web Page. " arXiv preprint arXiv:1004. 0459 (2010).
  4. htp://www. sourcefiles. org/Programming/Libraries/Networking/borZoi-1. 0. 2. tar. gz. shtml
  5. http://www. homeport. org/~adam/crypto/
  6. Whitfield Diffie, and Martin E. Hellman. "New directions in cryptography". Information Theory, IEEE Transactions on 22, no. 6 (1976): 644-654.
  7. Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, and Sugata Sanyal. "Data Hiding Techniques Using Prime and Natural Numbers. " arXiv preprint arXiv:1003. 3672 (2010).
  8. Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
  9. http://teal. gmu. edu/courses/Crypto_resources/web_resources/libraries. htm
  10. Victor Miller. "Use of elliptic curves in cryptography", in Advances in Cryptology—CRYPTO'85 Proceedings, pp. 417-426. Springer Berlin/Heidelberg, 1986.
  11. Sanyal, Sugata, Ayu Tiwari, and Sudip Sanyal. "A multifactor secure authentication system for wireless payment. " In Emergent Web Intelligence: Advanced Information Retrieval, pp. 341-369. Springer London, 2010.
  12. Baumgartner, Tobias, Ioannis Chatzigiannakis, Sándor Fekete, Christos Koninis, Alexander Kröller, and Apostolos Pyrgelis. "Wiselib: A generic algorithm library for heterogeneous sensor networks. " In Wireless Sensor Networks, pp. 162-177. Springer Berlin Heidelberg, 2010.
  13. http://en. wikipedia. org/wiki/Crypto%2B%2B
  14. Vivek Kapoor, Vivek Sonny Abraham and Ramesh Singh. "Elliptic curve cryptography. " ACM Ubiquity 9, no. 20 (2008): 20-26.
  15. Sandipan Dey, Ajith Abraham, and Sugata Sanyal. "An LSB Data Hiding Technique Using Natural Number Decomposition", in Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on, vol. 2, pp. 473-476. IEEE, 2007.
  16. Alexander Ulrich, Ralph Holz, Peter Hauck, and Georg Carle. "Investigating the openpgp web of trust", in Computer Security–ESORICS 2011, pp. 489-507. Springer Berlin Heidelberg, 2011.
  17. http://en. wikipedia. org/wiki/Nettle_(cryptographic_library)
  18. http://www. openpgp. org/
  19. Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sudip Sanyal, and Sugata Sanyal. "A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks. " arXiv preprint arXiv:1006. 1956 (2010).
  20. Denis, Tom St. "LibTomCrypt. " available online at libtom. org (2004).
  21. https://code. google. com/p/relic-toolkit/
  22. Gayoso Martinez, V. , C. Sanchez Avila, J. Espinosa Garcia, and L. Hernandez Encinas. "Elliptic curve cryptography: Java implementation issues. " In Security Technology, 2005. CCST'05. 39th Annual 2005 International Carnahan Conference on, pp. 238-241. IEEE, 2005.
  23. http://resources. infosecinstitute. com/cryptographic-libraries/
  24. Sugata Sanyal, Rohit Bhadauria, and Chittabrata Ghosh. "Secure communication in cognitive radio networks", in Computers and Devices for Communication, 2009. CODEC 2009. 4th International Conference on, pp. 1-4. IEEE, 2009.
  25. http://discovery. csc. ncsu. edu/software/TinyECC/
  26. Muhammad Yasir Malik. "Efficient implementation of elliptic curve cryptography using low-power digital signal processor", in Advanced Communication Technology (ICACT), 2010 The 12th International Conference on, vol. 2, pp. 1464-1468. IEEE, 2010.
  27. Tapalina Bhattasali, Rituparna Chaki, and Sugata Sanyal. "Sleep deprivation attack detection in wireless sensor network". arXiv preprint arXiv:1203. 0231(2012).
  28. Lloyd, Jack. "Botan Cryptographic Library. " h ttp://botan. randombit. net.
  29. An Liu, and Peng Ning. "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks", in Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on, pp. 245-256. IEEE, 2008.
  30. http://www. yassl. com/yaSSL/Home. html
  31. Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, and Ajith Abraham. "Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks", in IWDC, pp. 541-542. 2004.
  32. http://www. gnu. org/software/libgcrypt/
  33. Zachary Peterson. "Team AES-Andrew Wang, Sam (Jiewen) Wu, and Elton Yang CPE 458: Current Topics in Computer Systems (Cryptographic Engineering). " (2014).
  34. https://www. das-labor. org/wiki/AVR-Crypto-Lib/en
  35. https://github. com/ibr-alg/wiselib/wiki
  36. Kristin Lauter. "The advantages of elliptic curve cryptography for wireless security". IEEE Wireless communications 11, no. 1 (2004): 62-67.
  37. http://en. wikipedia. org/wiki/Libgcrypt
  38. https://www. certivox. com/miracl
  39. https://www. flexiprovider. de/
  40. John Viega, Matt Messier, and Pravir Chandra. "Network Security with OpenSSL: Cryptography for Secure Communications". O'Reilly Media, Inc. , 2002.
  41. Castle, Bouncy. "Bouncy castle crypto apis. " U RL http://www. bouncycastle. org/. (Cited on page 82. ) (2007).
  42. Goyal, Vipul, Virendra Kumar, Mayank Singh, Ajith Abraham, and Sugata Sanyal. "A new protocol to counter online dictionary attacks. " computers & security 25, no. 2 (2006): 114-120.
  43. Dolev, Danny, and Andrew C. Yao. "On the security of public key protocols. " Information Theory, IEEE Transactions on 29, no. 2 (1983): 198-208.
  44. T. Bingmann. "Speedtest and Comparsion of Open-Source Cryptography Libraries and Compiler Flags. " (2008).
Index Terms

Computer Science
Information Sciences

Keywords

ECC wolfSSL RELIC AvrCryptoLib TinyECC WiseLib