TY - JOUR
T1 - Lightweight Cryptographic Hash Functions
T2 - Design Trends, Comparative Study, and Future Directions
AU - Windarta, Susila
AU - Suryadi, Suryadi
AU - Ramli, Kalamullah
AU - Pranggono, Bernardi
AU - Gunawan, Teddy Surya
N1 - Funding Information:
This work was supported by the Universitas Indonesia through the Hibah Publikasi Terindeks Internasional (PUTI) Q2 Scheme under Contract NKB-1339/UN2.RST/HKP.05.00/2022. The work of Susila Windarta was supported in part by the Indonesia Endowment Fund for Education or Lembaga Pengelola Dana Pendidikan (LPDP).
Publisher Copyright:
© 2013 IEEE.
PY - 2022
Y1 - 2022
N2 - The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives that provide data integrity services. However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. As a result, researchers have proposed various lightweight cryptographic hash function algorithms. In this paper, we discuss advanced lightweight cryptographic hash functions for highly constrained devices, categorize design trends, analyze cryptographic aspects and cryptanalytic attacks, and present a comparative analysis of different hardware and software implementations. In the final section of this paper, we highlight present research challenges and suggest future research topics related to the design of lightweight cryptographic hash functions.
AB - The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives that provide data integrity services. However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. As a result, researchers have proposed various lightweight cryptographic hash function algorithms. In this paper, we discuss advanced lightweight cryptographic hash functions for highly constrained devices, categorize design trends, analyze cryptographic aspects and cryptanalytic attacks, and present a comparative analysis of different hardware and software implementations. In the final section of this paper, we highlight present research challenges and suggest future research topics related to the design of lightweight cryptographic hash functions.
KW - Internet of Things
KW - lightweight cryptographic hash function
KW - lightweight cryptography
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85135766413&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2022.3195572
DO - 10.1109/ACCESS.2022.3195572
M3 - Article
AN - SCOPUS:85135766413
SN - 2169-3536
VL - 10
SP - 82272
EP - 82294
JO - IEEE Access
JF - IEEE Access
ER -