Skip to main content
Log in

Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In contemporary realities, the development of a smart city and cyber–physical systems is impossible without ensuring their information security. Under conditions of limited resources, it is necessary to maintain a balance between the cryptographic strength of a ciphering algorithm and the requirements it imposes. In this study, we compare lightweight modifications of the Advanced Encryption Standard (AES) symmetric block cipher to determine the most balanced solution for ensuring the confidentiality of information interaction between low-power devices. The comparison is performed with the consideration for both the theoretical parameters determining the cryptographic strength, and encryption and decryption rates, depending on the input data size. Using the results of this investigation, it is concluded that the modified AES is a modification that satisfies most of the imposed requirements. This algorithm outperforms not only other modifications, but also the standard AES; it enhances the values of diffusion and confusion by 5 and 30%, respectively, and it reduces the average encryption/decryption time by a factor of 1.5.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.

REFERENCES

  1. Daemen, J. and Rijmen, V., AES proposal: Rijndael, 1999.

  2. Avanzi, R., The QARMA block cipher family. Almost MDS matrices over rings with zero divisors, nearly symmetric Even-Mansour constructions with non-involutory central rounds, and search heuristics for low-latency s-boxes, IACR Trans. Symmetric Cryptol., 2017, vol. 2017, no. 1, pp. 4–44.  https://doi.org/10.13154/tosc.v2017.i1.4-44

    Article  Google Scholar 

  3. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., and Wingers, L., The SIMON and SPECK lightweight block ciphers, DAC ’15: Proc. 52nd Annu. Design Automation Conf., 2015, p. 175.  https://doi.org/10.1145/2744769.2747946

  4. Li, L., Liu, B., Zhou, Yi., and Zou, Yi, SFN: A new lightweight block cipher, Microprocess. Microsyst., 2018, vol. 60, pp. 138–150.  https://doi.org/10.1016/j.micpro.2018.04.009

    Article  Google Scholar 

  5. Phan, R.C.W., Mini advanced encryption standard (mini-AES): A testbed for cryptanalysis students, Cryptologia, 2002, vol. 26, no. 4, pp. 283–306.  https://doi.org/10.1080/0161-110291890948

    Article  Google Scholar 

  6. Kawle, P., Hiwase, A., Bagde, G., Tekam, E., and Kalbande, R., Modified advanced encryption standard, Int. J. Soft Comput. Eng., 2014, vol. 4, no. 1, pp. 21–23.

    Google Scholar 

  7. Kumar, K., Ramkumar, K.R., and Kaur, A., A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays, J. King Saud Univ. Comp. Inf. Sci., 2020, vol. 34, no. 6, pp. 3878–3885.  https://doi.org/10.1016/j.jksuci.2020.08.005

    Article  Google Scholar 

  8. James, M. and Kumar, D.S., An implementation of modified lightweight advanced encryption standard in FPGA, Procedia Technol., 2016, vol. 25, pp. 582–589.  https://doi.org/10.1016/j.protcy.2016.08.148

    Article  Google Scholar 

  9. Abd Zaid, M., Modification advanced encryption standard for design lightweight algorithms, J. Kufa Math. Comput., 2019, vol. 6, no. 1, pp. 21–27.

    Google Scholar 

  10. Abdul Hussien, F.T., Rahma, A.M.S., and Abdul Wahab, H.B., A secure environment using a new lightweight AES encryption algorithm for e-commerce websites, Secur. Commun. Networks, 2021, vol. 2021, p. 9961172.  https://doi.org/10.1155/2021/9961172

    Article  Google Scholar 

  11. Zhukov, A.E., Lightweight cryptography. Part 1, Vopr. Kiberbezop., 2015, no. 1, pp. 26–43.

  12. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., and Barker, E., A statistical test suite for random and pseudorandom number generators for cryptographic applications, McLean, Va.: Booz-Allen and Hamilton Inc, 2001.

    Google Scholar 

  13. Shannon, C.E., Communication theory of secrecy systems, Bell Syst. Tech. J., 1949, vol. 28, no. 4, pp. 656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  MATH  Google Scholar 

Download references

Funding

This work was supported by the Ministry of Science and Higher Education of the Russian Federation, State Task no. 075-01024-21-02 from September 29, 2021 (project no. FSЕЕ-2021-0014).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to O. I. Berezovskaya.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by E. Smirnova

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Berezovskaya, O.I., Chuprov, S.S., Neverov, E.A. et al. Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices. Aut. Control Comp. Sci. 56, 994–1006 (2022). https://doi.org/10.3103/S0146411622080028

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411622080028

Keywords:

Navigation