CFP last date
20 October 2025
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 20 October 2025

Submit your paper
Know more
Random Articles
Reseach Article

Analysis and Evaluation of Modern Lightweight Cryptographic Algorithms: Standards, Hardware Implementation, and Security Considerations

by Sushil Khairnar, Deep Bodra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 37
Year of Publication: 2025
Authors: Sushil Khairnar, Deep Bodra
10.5120/ijca2025925634

Sushil Khairnar, Deep Bodra . Analysis and Evaluation of Modern Lightweight Cryptographic Algorithms: Standards, Hardware Implementation, and Security Considerations. International Journal of Computer Applications. 187, 37 ( Sep 2025), 10-15. DOI=10.5120/ijca2025925634

@article{ 10.5120/ijca2025925634,
author = { Sushil Khairnar, Deep Bodra },
title = { Analysis and Evaluation of Modern Lightweight Cryptographic Algorithms: Standards, Hardware Implementation, and Security Considerations },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2025 },
volume = { 187 },
number = { 37 },
month = { Sep },
year = { 2025 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number37/analysis-and-evaluation-of-modern-lightweight-cryptographic-algorithms-standards-hardware-implementation-and-security-considerations/ },
doi = { 10.5120/ijca2025925634 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-09-23T00:35:17.179365+05:30
%A Sushil Khairnar
%A Deep Bodra
%T Analysis and Evaluation of Modern Lightweight Cryptographic Algorithms: Standards, Hardware Implementation, and Security Considerations
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 37
%P 10-15
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The proliferation of resource-constrained devices in the Internet of Things (IoT) has intensified the need for cryptographic algo- rithms that are both secure and efficient. Traditional cryptographic schemes such as AES and RSA, while robust, are often unsuit- able for embedded and low-power devices due to computational and memory demands. This paper presents a comprehensive re- view of lightweight cryptography (LWC), focusing on algorith- mic taxonomy, comparative hardware performance, standardiza- tion initiatives by NIST, and evolving attack countermeasures. A detailed comparative analysis of six algorithms is provided using performance metrics such as gate equivalents, throughput, energy efficiency, and side-channel attack resistance. Additional empha- sis is given to emerging paradigms such as memristive cryptogra- phy and post-quantum lightweight solutions. Visual aids including comparative tables, radar charts, and performance graphs illustrate trade-offs across algorithms. The study also identifies gaps in cur- rent research and outlines future directions, including AI-assisted cryptanalysis, bio-inspired architectures, and green cryptography.

References
  1. Biryukov, A., & Perrin, L. (2017). State of the Art in Lightweight Symmetric Cryptography. IACR Cryptology ePrint Archive, 2017/511.
  2. Kaur, J., Singh, A., & Arora, V. (2023). Performance and Se- curity Evaluation of ASCON and GIFT for IoT Applications. Journal of Cryptographic Engineering, 13(1), 45–58.
  3. Eisenbarth, T., Kasper, M., Moradi, A., Paar, C., Salma- sizadeh, M., & Shalmani, M. T. M. (2007). On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In Advances in Cryptology – CRYPTO 2008.
  4. Arora, V., Gupta, A., & Sharma, P. (2021). Hardware Effi- ciency Analysis of Modern Lightweight Block Ciphers for Embedded Platforms. Microprocessors and Microsystems, 82, 104005.
  5. Banik, S., Bogdanov, A., Isobe, T., et al. (2020). GIFT: A Small Present. In Cryptographic Hardware and Embedded Systems – CHES 2017, LNCS, vol. 10529.
  6. Li, C., Wang, T., & Zhao, Y. (2022). Memristor-Based Cryp- tographic Primitives: Opportunities and Challenges for Ultra- Low Power Security. IEEE Transactions on Nanotechnology, 21, 456–465.
  7. Deep Bodra and Sushil Khairnar. (2025). Comparative perfor- mance analysis of modern NoSQL data technologies: Redis, Aerospike, and Dragonfly. Journal of Research, Innovation and Technologies, 4, 2(8), 193–200.
  8. National Institute of Standards and Technology (NIST). (2023). Lightweight Cryptography Finalist: ASCON.
  9. Singh, R., Sharma, K., & Bansal, A. (2022). Side-Channel Attack Resilience in Lightweight Block Ciphers: A Survey. ACM Computing Surveys, 54(5), Article 95.
  10. Sushil Khairnar, Gaurav Bansod, and Vijay Dahiphale. (2019). A Lightweight Cryptographic Solution for 6LoWPAN Protocol Stack. In Intelligent Computing, Springer Interna- tional Publishing, 977–994.
  11. Bansal, P., Singh, R., & Sharma, K. (2022). Lightweight cryp- tography in IoT networks: A survey. Future Generation Com- puter Systems, 128, 246–264.
  12. Ahmad, T., Khan, S., & Ali, H. (2025). Securing IoT edge: A survey on lightweight cryptography, anonymous routing and communication protocol enhancements. International Jour- nal of Information Security.
  13. Mahdi, M., & Abdullah, L. (2025). Fortifying future IoT se- curity: A comprehensive review on lightweight post-quantum cryptography. Engineering, Technology & Applied Science Research, 15(1), 123–136.
  14. Sushil Khairnar. (2025). Application of Blockchain Frame- works for Decentralized Identity and Access Management of IoT Devices. International Journal of Advanced Computer Science and Applications, 16(6).
  15. Singh, A., Verma, P., & Gupta, A. (2025). Rudraksh: A com- pact and lightweight post-quantum key-encapsulation mecha- nism. arXiv preprint arXiv:2501.13799.
  16. Gogolewski, M., de Clercq, R., & Oswald, D. (2021). Quantum-resistant security for software updates on low-power networked embedded devices. arXiv preprint arXiv:2106.05577.
  17. Al Hashmi, F., Abideen, A., & Shamsi, Z. (2023). Code-based cryptography in IoT: A HW/SW co-design of HQC. arXiv preprint arXiv:2301.04888.
Index Terms

Computer Science
Information Sciences

Keywords

Lightweight Cryptography IoT Security NIST Ciphers