Research Article

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

Table 7

Comparative analysis of symmetric, asymmetric, and hash cryptography based on the various parameters [25, 26].

ParametersSymmetricAsymmetricHash

Block sizeFixedā€”Variable
KeyRequiredRequiredRequired
Resource consumptionLowHighLow
Computation time complexityLowHighLow
ApplicationEncryptionTo create secure channel/authenticationAuthentication