Research Article
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Table 5
Comparative analysis of conventional and lightweight cryptography algorithms.
| Algorithm | Block size (in bits) | Key size (in bits) | No. of rounds | Structure | Year published |
| Conventional algorithms | DES Wong (Wark and Dawson, 1998) | 64 | 56 | 16 | FN | 1975 | 3DES (Patil et al. 2016) | 64 | 168/112/56 | 48 | FN | 1998 | AES (Daemen and Rijmen, 2013) | 128 | 128/192/256 | 10/12/14 | SPN | 2001 | Blowfish (Singh and Singh, 2013) | 64 | 32-448 | 16 | FN | 1993 | Lightweight algorithms | PRESENT (Bogdanov et al. 2007) | 64 | 80/128 | 32 | SPN | 2007 | Clefia (Shirai et al. 2007) | 128 | 128/192/256 | 18/22/26 | FN | 2007 | HIGHT (Hong et al. 2006) | 64 | 128 | 32 | FN | 2016 | RECTANGLE (Zhang et al. 2015) | 64 | 80/128 | 25 | SPN | 2015 | PICO (Bansod et al. 2016) | 64 | 80/128 | 32 | SPN | 2016 | BORON (Bansod et al. 2017) | 64 | 80/128 | 25 | SPN | 2017 |
|
|