Research Article

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

Figure 5

Block diagram of the symmetric algorithm.