An Efficient Lightweight Cryptography Hash Function for Big Data and IoT Applications

被引:4
作者
Al-Odat, Zeyad A. [1 ]
Al-Qtiemat, Eman M. [2 ]
Khan, Samee U. [3 ]
机构
[1] Tafila Tech Univ, Dept Commun & Comp Engn, Tafila, Jordan
[2] North Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58102 USA
[3] Mississippi State Univ, Dept Elect & Comp Engn, Starkville, MS USA
来源
2020 IEEE CLOUD SUMMIT | 2020年
关键词
Hash function; Lightweight Cryptography; Security; IoT; Big Data;
D O I
10.1109/IEEECloudSummit48914.2020.00016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a lightweight cryptography hash function for big data and IoT applications. The proposed design employs S-Box, linear transformation, and bit permutation functionalities. Conventional hash functions require memory and time to process big data and IoT applications. Therefore, a secure and quick lightweight cryptography protocol is needed. This design provides the security requirements of the conventional hash functions and the specifications of the lightweight cryptography protocols. The proposed design is tested and verified using three of the lightweight requirements: speed, memory and power consumption. The results show that the proposed design outperforms other lightweight protocols in terms of speed, memory and power consumption. Moreover, the security analysis shows that this design posses the general security requirements of the conventional hash protocols.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 20 条
  • [1] Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques
    Al-Odat, Zeyad A.
    Ali, Mazhar
    Abbas, Assad
    Khan, Samee U.
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (05)
  • [2] The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions
    Al-Odat, Zeyad A.
    Khan, Samee U.
    [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 811 - 816
  • [3] Alizadeh M., 2012, SECURITY PERFORMANCE
  • [4] Aumasson JP, 2010, LECT NOTES COMPUT SC, V6225, P1, DOI 10.1007/978-3-642-15031-9_1
  • [5] Bogdanov A, 2011, LECT NOTES COMPUT SC, V6917, P312, DOI 10.1007/978-3-642-23951-9_21
  • [6] Bussi K., 2016, IACR Cryptology ePrint Archive, V2016, P42
  • [7] IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges
    Cai, Hongming
    Xu, Boyi
    Jiang, Lihong
    Vasilakos, Athanasios V.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01): : 75 - 87
  • [8] Daemen J., 1999, 1 CAND C AES1
  • [9] A survey of lightweight-cryptography implementations
    Eisenbarth, Thomas
    Kumar, Sandeep
    Paar, Christof
    Poschmann, Axel
    Uhsadel, Leif
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 522 - 533
  • [10] Elumalai R., 2011, International Journal of Scientific & Engineering Research, V2