<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>lightweight cryptography documentation</title><link>https://community.element14.com/technologies/internet-of-things/w/documents/1317/lightweight-cryptography-documentation</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>lightweight cryptography documentation</title><link>https://community.element14.com/technologies/internet-of-things/w/documents/1317/lightweight-cryptography-documentation</link><pubDate>Wed, 06 Oct 2021 20:47:02 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:621f0856-8cad-4815-a9a4-621bdd4235bc</guid><dc:creator>mr.osint</dc:creator><comments>https://community.element14.com/technologies/internet-of-things/w/documents/1317/lightweight-cryptography-documentation#comments</comments><description>Current Revision posted to Documents by mr.osint on 10/6/2021 8:47:02 PM&lt;br /&gt;
&lt;p style="margin:0;"&gt;The tight cost and implementation constraints of high-volume products, including secure RFID tags and smart cards, require specialized cryptographic implementations. The authors review recent developments in this area for symmetric and asymmetric ciphers, targeting embedded hardware and software&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="text-decoration:underline;"&gt;Reference&lt;/span&gt;:&lt;/p&gt;&lt;p style="margin:0;"&gt;A survey of lightweight-cryptography implementations&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;a class="jive-link-external-small" href="http://www.ei.rub.de/media/crypto/veroeffentlichungen/2010/08/08/lwc_survey_ieee_dtco2007.pdf" rel="nofollow" target="_blank"&gt;http://www.ei.rub.de/media/crypto/veroeffentlichungen/2010/08/08/lwc_survey_ieee_dtco2007.pdf&lt;/a&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;Lightweight cryptography (LWC) is a cryptographic algorithm or protocol tailored for implementation in constrained environments including RFID tags, sensors, contactless smart cards, health-care devices,Internet of Things (IoT) and so on.&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="text-decoration:underline;"&gt;Reference&lt;/span&gt;: Lightweight Cryptography for the Internet of Things -Masanobu Katagi and Shiho Moriai-Sony Corporation&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;(&lt;strong&gt; by mr.osint&lt;/strong&gt;: as a technical point of&amp;nbsp; view &amp;quot;Lightweight&amp;quot; word&amp;nbsp; means the&amp;nbsp; cryptographic algorithm has &lt;span style="text-decoration:underline;"&gt;&lt;span style="color:#3d3d3d;text-decoration:underline;"&gt;smaller ciphertext than the others,&lt;/span&gt;&lt;/span&gt; for example&lt;/p&gt;&lt;p style="margin:0;"&gt;1)Using an ECDSA 256-bit key provides better security than RSA 2048, &lt;span style="text-decoration:underline;"&gt;which significantly reduces the amount of data&lt;/span&gt; that needs to be transmitted between peers during the key exchange process of protocols like TLS, DTLS and IKE. This bandwidth savings is desirable for &lt;span style="text-decoration:underline;"&gt;IoT&lt;/span&gt; devices or other end-entities that need to minimize bandwidth consumption over radio interfaces.&lt;/p&gt;&lt;p style="margin:0;"&gt;Reference: Provisioning X.509 Certificates Using RFC 7030- SEPTEMBER 2014 | ISSUE 245 | www.linuxjournal.com ,&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;2)This allows ECC to achieve the same level of security with &lt;span style="text-decoration:underline;"&gt;smaller key sizes&lt;/span&gt; and higher computational efficiency; ECC-160 provides comparable security to RSA 1024 and ECC-224 provides comparable security to RSA-2048 ... We plan to continue our work on small devices towards a complete lightweight implementation of the security protocol SSL/TLS.&lt;/p&gt;&lt;p style="margin:0;"&gt;Reference: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs - Nils Gura, Arun Patel .... Sun Microsystems Laboratories&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;a class="jive-link-external-small" href="https://www.iacr.org/archive/ches2004/31560117/31560117.pdf" rel="nofollow ugc noopener" target="_blank" title="https://www.iacr.org/archive/ches2004/31560117/31560117.pdf"&gt;https://www.iacr.org/archive/ches2004/31560117/31560117.pdf&lt;/a&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;)&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;sharing your knowledge &lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: cryptography, internet of things, lightweight, iot, ecc&lt;/div&gt;
</description></item></channel></rss>