2022
DOI: 10.1109/access.2022.3195572
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

Abstract: The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives that provide data integrity services. However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. As a result, researchers have proposed various ligh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 116 publications
0
4
0
Order By: Relevance
“…Braille transformation, traditionally used to enable blind individuals to read and write, provides a unique opportunity to add a layer of encryption to passwords. By integrating this transformation method before generating the hash, we aim to enhance resistance against brute force, statistical, and differential attacks [11][12][13][14][15][16][17][18][19][20]. Our rigorous methodology involves first decomposing the password into blocks representing each character.…”
Section: Introductionmentioning
confidence: 99%
“…Braille transformation, traditionally used to enable blind individuals to read and write, provides a unique opportunity to add a layer of encryption to passwords. By integrating this transformation method before generating the hash, we aim to enhance resistance against brute force, statistical, and differential attacks [11][12][13][14][15][16][17][18][19][20]. Our rigorous methodology involves first decomposing the password into blocks representing each character.…”
Section: Introductionmentioning
confidence: 99%
“…None of these is amongst the finalists of the NIST LWC, which is the focus of our study. [28] focuses on the analysis of cryptographic areas and cryptanalysis attacks of various hash functions suitable for lightweight ciphers. They have also conducted a comparative study and presented research challenges on hardware and software implementations of those lightweight cryptography hash functions.…”
Section: Introductionmentioning
confidence: 99%
“…Numerous review publications are dealing with lightweight security for IoT [3][4][5]. Therefore, it will be not repeated and the interested reader can consult [1][2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%