CFP last date
22 December 2025
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 22 December 2025

Submit your paper
Know more
Random Articles
Reseach Article

Evaluating Lightweight Cryptographic Standards for IoT: Design, Metrics, and Security Insights

by Adarsh Jiju David, Alan James Robert, Aswin Mammen, Eldhose Babichan, Sandhya C.P.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 55
Year of Publication: 2025
Authors: Adarsh Jiju David, Alan James Robert, Aswin Mammen, Eldhose Babichan, Sandhya C.P.
10.5120/ijca2025925931

Adarsh Jiju David, Alan James Robert, Aswin Mammen, Eldhose Babichan, Sandhya C.P. . Evaluating Lightweight Cryptographic Standards for IoT: Design, Metrics, and Security Insights. International Journal of Computer Applications. 187, 55 ( Nov 2025), 12-17. DOI=10.5120/ijca2025925931

@article{ 10.5120/ijca2025925931,
author = { Adarsh Jiju David, Alan James Robert, Aswin Mammen, Eldhose Babichan, Sandhya C.P. },
title = { Evaluating Lightweight Cryptographic Standards for IoT: Design, Metrics, and Security Insights },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2025 },
volume = { 187 },
number = { 55 },
month = { Nov },
year = { 2025 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number55/evaluating-lightweight-cryptographic-standards-for-iot-design-metrics-and-security-insights/ },
doi = { 10.5120/ijca2025925931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-11-18T21:10:54.402082+05:30
%A Adarsh Jiju David
%A Alan James Robert
%A Aswin Mammen
%A Eldhose Babichan
%A Sandhya C.P.
%T Evaluating Lightweight Cryptographic Standards for IoT: Design, Metrics, and Security Insights
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 55
%P 12-17
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid growth of Internet of Things (IoT) applications in domains such as healthcare, industrial systems, smart environments, and defence requires secure communication for devices, even when they operate with very low power, limited storage, or slow processors. Traditional cryptographic algorithms such as AES, although secure, demand significant processing power and hardware resources, making them unsuitable for constrained platforms. This challenge motivates the adoption of lightweight cryptography, which is specifically designed to deliver strong protection with minimal resource usage. This paper presents a survey of lightweight cryptographic algorithms tailored for IoT and embedded environments, analyzing their characteristics based on parameters such as block size, key size, number of rounds, throughput, and gate equivalents. Drawing on recent benchmarking studies and comparative evaluations, it highlights design trade-offs, security considerations, and implementation challenges. From this analysis, it is observed that lightweight algorithms achieve a more favorable balance of efficiency, robustness, and scalability, offering valuable guidance for selecting optimal cryptographic solutions in resource-constrained IoT deployments.

References
  1. M. A. Philip and Vaithiyanathan, "A survey on lightweight ciphers for IoT devices," 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy), Kollam, India, 2017, pp. 1-4, doi:10.1109/TAPENERGY.2017.8397271.
  2. Al-Nofaie SM, Sharaf S, Molla R. Design Trends and Comparative Analysis of Lightweight Block Ciphers for IoTs. Applied Sciences. 2025; 15(14):7740. https://doi.org/10.3390/app15147740
  3. B. S, K. Jain and P. Krishnan, "Securing IoT Devices with Enhanced Tiny Encryption Algorithm," 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India, 2024, pp. 700-705, doi:10.1109/ICACRS62842.2024.10841704.
  4. Wheeler, D.J., Needham, R.M. (1995). TEA, a tiny encryption algorithm. In: Preneel, B. (eds) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, vol 1008. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60590-8_29.
  5. P. E. A. Adriaanse, M. Ayşen, and Z. Erkin, "A Comparative Study of the TEA, XTEA, PRESENT and Simon lightweight cryptographic schemes," Delft University of Technology, Cyber Security Group, Dept. of Intelligent Systems, 2021.
  6. De Cannière, C., Dunkelman, O., Knežević, M. (2009). KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds) Cryptographic Hardware and Embedded Systems - CHES 2009. CHES 2009. Lecture Notes in Computer Science, vol 5747. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04138-9_20
  7. D. Lin, M. Li, Z. Hou, and S. Chen, “Conditional differential analysis on the KATAN ciphers based on deep learning,” IET Signal Processing, vol. 16, no. 8, pp. 981–989, Nov. 2022, doi: 10.1049/ise2.12099.
  8. Guo, J., Peyrin, T., Poschmann, A., Robshaw, M. (2011). The LED Block Cipher. In: Preneel, B., Takagi, T. (eds) Cryptographic Hardware and Embedded Systems – CHES 2011. CHES 2011. Lecture Notes in Computer Science, vol 6917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23951-9_22
  9. Mendel, F., Rijmen, V., Toz, D., Varıcı, K. (2012). Differential Analysis of the LED Block Cipher. In: Wang, X., Sako, K. (eds) Advances in Cryptology – ASIACRYPT 2012. ASIACRYPT 2012. Lecture Notes in Computer Science, vol 7658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34961-4_13
  10. Lee D, Kim D-C, Kwon D, Kim H. Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA. Sensors. 2014; 14(1):975-994. https://doi.org/10.3390/s140100975
  11. H. M. S. El Hennawy, A. E. A. Omar, and S. M. A. Kholaif, “LEA: Link encryption algorithm proposed stream cipher algorithm,” Ain Shams Eng. J., vol. 6, no. 4, pp. 1339–1346, Dec. 2015, doi: 10.1016/j.asej.2014.08.001.
  12. Z. Haider, K. Javeed, M. Song and X. Wang, "A Low-Cost Self-Test Architecture Integrated With PRESENT Cipher Core," in IEEE Access, vol. 7, pp. 46045-46058, 2019, doi: 10.1109/ACCESS.2019.2907717.
  13. R. Chatterjee and R. Chakraborty, "A Modified Lightweight PRESENT Cipher For IoT Security," 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), Gunupur, India, 2020, pp. 1-6, doi: 10.1109/ICCSEA49143.2020.9132950.
  14. C. A. Lara-Nino, A. Diaz-Perez and M. Morales-Sandoval, "Lightweight Hardware Architectures for the Present Cipher in FPGA," in IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 64, no. 9, pp. 2544-2555, Sept. 2017, doi: 10.1109/TCSI.2017.2686783.
  15. Biryukov, A., Roy, A., Velichkov, V. (2015). Differential Analysis of Block Ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds) Fast Software Encryption. FSE 2014. Lecture Notes in Computer Science(), vol 8540. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46706-0_28
  16. R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, “The SIMON and SPECK lightweight block ciphers,” in Proc. 52nd Annu. Design Autom. Conf. (DAC), San Francisco, CA, USA, Jun. 2015, pp. 1–6, doi: 10.1145/2744769.2747946.
  17. Radhakrishnan I, Jadon S, Honnavalli PB. Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices. Sensors. 2024; 24(12):4008. https://doi.org/10.3390/s24124008
  18. D. Indrajati and W. M. Ashari, “Evaluation of the effectiveness of lightweight encryption algorithms on data performance and security on IoT devices,” J. Appl. Inform. Comput., vol. 9, no. 3, pp. 642–650, Jun. 2025.
  19. G. Cagua, V. Gauthier-Umaña and C. Lozano-Garzon, "Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices," in IEEE Access, vol. 13, pp. 16671-16682, 2025, doi: 10.1109/ACCESS.2025.3529757.
  20. Prasanthi, B.V. & Reddy, P. (2024). Advances in Cyber Security and Digital Forensics e-ISBN: 978-93-6252-987-9 iip series frontiers in secure software defined networking: a research perspective frontiers in secure software defined networking: a research perspective iip series frontiers in secure software defined networking: a research perspective. 10.58532/nbennurch259.
  21. P. S. Suryateja and K. V. Rao, “A Survey on Lightweight Cryptographic Algorithms in IoT”, Dept. of CS&SE, AUCOE, Andhra University, India, Published Online: Mar. 23, 2024, pp. 21–34, received Oct. 23, 2023, accepted Jan. 15, 2024, doi: 10.2478/cait-2024-0002.
  22. V. Panchami and M. M. Mathews, "A Substitution Box for Lightweight Ciphers to Secure Internet of Things," J. King Saud Univ. Comput. Inf. Sci., vol. 35, no. 9, pp. 10491–10504, Sep. 2023, doi: 10.1016/j.jksuci.2023.03.004.
  23. J. Kaur, A. C. Canto, M. M. Kermani, and R. Azarderakhsh, "A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard," arXiv preprint arXiv:2304.06222, Apr. 2023, doi: 10.48550/arXiv.2304.06222.
  24. V. A. Thakor, M. A. Razzaque and M. R. A. Khandaker, "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities," in IEEE Access, vol. 9, pp. 28177-28193, 2021, doi: 10.1109/ACCESS.2021.3052867.
  25. El-hajj, M.; Mousawi, H.; Fadlallah, A. Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. Future Internet 2023, 15, 54. https://doi.org/10.3390/fi15020054
Index Terms

Computer Science
Information Sciences

Keywords

IoT Lightweight block ciphers PRESENT TEA LED ASCON SPECK SIMON KATAN LEA