Research Article

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

Table 5

Comparative analysis of conventional and lightweight cryptography algorithms.

AlgorithmBlock size (in bits)Key size (in bits)No. of roundsStructureYear published

Conventional algorithms
DES Wong (Wark and Dawson, 1998)645616FN1975
3DES (Patil et al. 2016)64168/112/5648FN1998
AES (Daemen and Rijmen, 2013)128128/192/25610/12/14SPN2001
Blowfish (Singh and Singh, 2013)6432-44816FN1993
Lightweight algorithms
PRESENT (Bogdanov et al. 2007)6480/12832SPN2007
Clefia (Shirai et al. 2007)128128/192/25618/22/26FN2007
HIGHT (Hong et al. 2006)6412832FN2016
RECTANGLE (Zhang et al. 2015)6480/12825SPN2015
PICO (Bansod et al. 2016)6480/12832SPN2016
BORON (Bansod et al. 2017)6480/12825SPN2017