Research Article
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Table 7
Comparative analysis of symmetric, asymmetric, and hash cryptography based on the various parameters [
25,
26].
| Parameters | Symmetric | Asymmetric | Hash |
| Block size | Fixed | ā | Variable | Key | Required | Required | Required | Resource consumption | Low | High | Low | Computation time complexity | Low | High | Low | Application | Encryption | To create secure channel/authentication | Authentication |
|
|