Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
23
,
No.
1
,
Ju
ly
2021
, p
p.
54
0
~
54
8
IS
S
N: 25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v
23
.i
1
.
pp
54
0
-
54
8
540
Journ
al h
om
e
page
:
http:
//
ij
eecs.i
aesc
or
e.c
om
Analysis
of desi
gn
goals of crypt
ograph
y al
gorithm
s based
on
different
compon
ents
Ali M
ohamm
ad
N
orouz
z
ad
eh Gil
Molk
1
,
Moham
ma
d
Rez
a
Are
f
2
,
Rez
a
Ramaz
an
i
Kh
orsh
idd
oust
3
1
Depa
rtment of
Com
pute
r
Engi
n
ee
ring
,
Isl
amic Azad
Unive
rsit
y,
North
Te
hr
an Branc
h,
T
ehr
an
,
Ira
n
2
Depa
rtment of
El
e
ct
ri
ca
l
Eng
in
ee
ring
,
Shar
if
U
nive
rsit
y
of Technolog
y
,
Te
hr
an
,
Ir
an
3
Depa
rtment of I
ndustria
l
Engi
n
e
eri
ng
&
Man
agem
ent
S
y
st
ems
,
Am
irka
bir
Unive
r
sit
y
of Te
ch
nolo
g
y
,
T
ehr
an
,
Ir
an
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Feb
8
, 2
021
Re
vised
A
pr
20
, 2
021
Accepte
d
Ma
y
1,
2021
Cr
y
ptogr
aph
y
algorithms
are
a
funda
m
ent
al
p
art
of
a
cr
y
p
togra
p
hic
s
y
st
em
tha
t
is
design
ed
and
implement
e
d
to
inc
re
ase
inf
orm
at
ion
sec
ur
ity
.
Th
e
y
are
the
ce
nt
er
of
a
t
te
nti
on
of
expe
r
ts
in
the
informati
on
technolog
y
dom
a
ins.
Although
the
cr
y
ptogr
aph
y
a
lgo
rit
hm
s
are
impl
emente
d
to
atta
i
n
the
go
al
s
such
as
conf
identia
l
l
y
,
in
te
gr
ity,
and
aut
h
ent
i
cit
y
of
design
ing,
but
othe
r
m
at
te
rs
th
at
m
ust
be
not
iced
b
y
designers
inc
lud
e
spe
ed
,
resourc
e
consum
pti
on,
re
li
ability
,
fl
exi
b
ilit
y
,
usag
e
t
y
p
e,
and
so
on.
For
the
usef
u
l
al
lo
ca
t
ion
of
ha
rdware
,
softwar
e,
and
hum
an
r
esourc
es
,
it
is
i
m
porta
nt
to
ide
nti
f
y
th
e
role
of
ea
ch
of
the
fac
tors
i
nflue
nc
ing
the
design
of
cr
y
p
togra
ph
ic
a
lgori
thms
to
inve
st
in
the
dev
el
opm
ent
of
cr
y
ptogr
aph
i
c
knowledge
.
Th
i
s
pape
r
exa
m
ine
s
1700
pap
ers,
documents,
and
te
chnica
l
rep
orts
of
intern
at
ion
al
journ
al
s
in
the
spe
ci
f
ic
l
engt
h
y
per
iod
(
1978
-
2019),
and
the
goal
of
t
he
design
and
i
m
ple
m
ent
at
ion
o
f
cr
y
p
togra
ph
y
a
lgori
thms
in
a
diffe
r
ent
per
io
d
is
ext
racte
d
.
Us
ing
a
stat
isti
cal
popula
ti
on
th
at
con
sists
of
ti
m
e
and
the
nu
m
ber
of
documents
in
a
long
ti
m
e
and
al
so
a
var
i
ety
of
dat
a
,
le
ads
thi
s
stud
y
t
o
have
a
reliab
le
result
and
attra
c
t
the
atten
ti
on
of
designe
rs.
The
result
s
show
tha
t
in
rec
ent
y
e
ars,
attention
t
o
new
usage
suc
h
as
IoT
and
te
l
emedic
i
n
e,
as
well
as
li
ghtwe
ight
cr
y
ptogr
aph
y
,
has
inc
r
ea
sed
to
ac
hie
ve
the
m
ai
n
goa
ls.
Ke
yw
or
d
s
:
An
al
ysi
s
Com
po
ne
nt
Crypto
gr
a
phy
al
gorithm
s
IoT
Tel
e
m
edici
ne
This
is an
open
acc
ess arti
cl
e
un
der
the
CC
B
Y
-
SA
l
ic
ense
.
Corres
pond
in
g
Aut
h
or
:
Moh
am
m
ad
Re
za A
ref
Dep
a
rtm
ent o
f El
ect
rical
En
gi
neer
i
ng
Sh
a
rif Un
i
ver
si
ty
o
f
Tec
hnol
ogy
Tehr
a
n, I
ran
Em
a
il
: aref@sharif
.edu
1.
INTROD
U
CTION
Accor
ding
to
Kenneth
Gee
rs
,
a
cy
ber
se
cu
rity
strat
egist,
the
pr
e
dom
inant
aspect
of
na
ti
onal
secu
rity
in
2025
de
pends
on
t
he
dev
e
lop
m
ent
of
i
nfor
m
at
ion
te
ch
nolo
gy
[
1].
O
n
the
ot
her
ha
nd,
crypto
grap
hy
is
the
m
os
t
crit
ic
al
mechan
ism
for
upgra
ding
the
s
ecur
it
y
le
vel
of
i
nfor
m
at
ion
.
E
ver
y
c
rypto
gra
ph
y
syst
e
m
include
s
three
pa
rts:
cryptogra
ph
y
al
gorithm
s,
cryptography
keys,
and
sec
ur
it
y
protoc
ols.
Mo
r
eov
e
r,
cry
ptog
raphy
al
gorithm
s
are
a
fund
am
ental
par
t
of
this
syst
e
m
[2
]
.
Ho
we
ver,
crypto
gra
ph
y
al
gorithm
s
are
i
m
ple
m
ent
ed
to
at
ta
in
the
go
al
s
su
c
h
a
s
sec
ur
it
y
or
c
onfi
den
ti
al
it
y,
integrity
,
a
nd
aut
hen
ti
ci
ty
of
de
sign
i
ng
[
3],
bu
t
f
or
desig
ning
the
m
,
m
any
com
pone
nts
shou
l
d
be
con
si
der
e
d,
su
ch
as
sp
ee
d,
res
ource
co
ns
um
ption,
usa
ge
ty
pe
[4
]
-
[
6].
S
o,
pr
ov
i
ding
al
l
of
these
needs
in
al
gorithm
desi
gn
sim
ultaneo
us
ly
is
a
pr
ob
l
e
m
at
ic
m
a
tt
er
and,
in
so
m
e
cases,
is
i
m
po
ssible.
I
f
co
ntra
dicto
r
y
go
al
s
a
re
c
on
si
der
e
d
i
n
def
i
ning
the
goal
s
of
desig
ni
ng
a
n
al
gorithm
,
m
os
t
al
gorithm
s
can
be
bro
ken,
a
nd
if
t
he
at
ta
cker
has
en
ough
ti
m
e,
resour
c
es
an
d
desire
,
it
can
expose
the i
nfo
rm
ation
[7].
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
alysis of
des
ign
goals
o
f c
r
ypto
graphy
algorit
hms
ba
s
ed
on
… (
Ali
M
ohamm
ad Nor
ouz
za
de
h Gil
M
olk
)
541
The
stre
ng
t
h
of
crypt
ography
highly
dep
e
nds
on
the
desi
gn
a
nd
im
ple
m
entat
ion
of
c
rypto
gr
a
phy
al
gorithm
s
[8
]
,
and
the
the
or
et
ic
al
pr
op
e
rtie
s
of
al
gorit
hm
s
dep
en
d
on
the
validit
y
and
inte
gr
it
y
of
their
i
m
ple
m
ent
at
io
n
in s
of
tw
are a
nd
hard
war
e
[9]
. O
n
the
oth
e
r han
d,
t
her
e a
re
m
any chall
enges for
im
ple
m
e
nting
crypto
gr
a
phy al
gorithm
s su
ch
as r
un
ti
m
e,
me
m
or
y usag
e a
nd
c
om
pu
ti
ng
powe
r
consum
ption, which ar
e all
o
f
the m
entioned
factors t
hat im
pact the
goal
s
f
or d
esi
gn
i
ng th
e algori
thm
[
10]
.
In
[
11]
the
ge
ner
al
te
ndency
towards
cry
pt
ography
in
va
rio
us
sect
ors
of
the
in
dustry
has
bee
n
stud
ie
d
in
a
13
-
ye
ar
pe
rio
d
(2005
-
20
18),
w
hi
ch
sh
ows
that
in
2005,
15%
of
or
gan
iz
at
io
ns
and
in
20
17,
43%
of
t
hem
hav
e
a
crypto
grap
hic
str
at
egy.
It
can
be
sai
d
that
t
oday
,
the
m
os
t
sign
ific
a
nt
feat
ures
of
c
rypt
ogr
aph
y
are
syst
e
m
fu
nction
a
nd
delay
tim
e,
po
li
cy
i
m
ple
m
entation
an
d
sup
port
fo
r
cl
ou
d
de
plo
ym
ent
and
IoT
crypto
gr
a
phy
[
12
]
-
[
15
]
.
As
c
an
be
see
n,
th
e
ne
w
necessit
ie
s
in
this
dom
ai
n,
s
uc
h
as
quant
um
crypto
gr
a
phy
[16]
an
d
sm
art
gr
i
d
[
17]
,
re
quire
the
se
needs
to
be
co
ns
i
de
red
i
n
the
desi
gn
of
cry
ptogr
aph
ic
al
gorith
m
s.
So
the
pu
rpose
of
this
stu
dy
is
exam
inati
on
a
nd
sta
ti
sti
cal
analy
sis
of
go
al
s
of
desig
n
a
nd
im
ple
m
entation
of
crypto
gr
a
phy
a
lgorit
hm
s b
ased
on d
i
ff
e
ren
t c
om
po
ne
nts [1
8]
.
Ther
e
ha
ve
be
en
stu
dies
to
c
om
par
e
crypt
ogra
phic
al
gorithm
s
fr
om
diff
e
ren
t
po
i
nts
of
view
s
uc
h
as
secur
it
y
of
onli
ne
app
li
cat
io
ns
thr
ough
cr
yptogra
ph
ic
al
gorithm
s
[1
9],
data
and
a
pp
l
ic
at
ion
s
secu
rity
an
d
pri
vacy
[
20
]
,
[
21]
,
inc
reasi
ng
sec
ur
it
y
in
so
ft
war
e
de
vel
op
m
ent
[
22
]
a
nd
li
ghtwei
ght
al
gorithm
s
in
I
oT
app
li
cat
io
ns
[
23
]
-
[
26]
.
In
this
pap
e
r,
the
ap
proac
h
of
c
ryp
tograp
hic
al
gorithm
design
er
s
at
var
io
us
ti
m
es
in
te
rm
s
of
severa
l
co
m
po
ne
nts
,
su
ch
as
sec
uri
ty
,
sp
eed,
si
m
pl
ic
it
y,
flexibili
ty
,
us
abili
t
y,
and
res
ourc
e
us
age
,
will
b
e a
naly
zed.
2.
METHO
DOL
OGY
In
or
der
to
acc
ur
at
el
y
and
rel
ia
bly
exa
m
ine
the
go
al
s
,
m
eth
ods,
a
nd
m
ec
han
ism
s
of
de
sign
i
ng
a
nd
i
m
ple
m
enting
crypto
gr
a
phic
al
gorithm
s,
com
pr
ehen
sive
i
nfor
m
at
ion
is
need
e
d
in
te
rm
s
of
the
ti
m
e
i
nter
val,
ty
pe
of
al
gorit
hm
(sy
m
m
et
ri
c,
asy
m
m
et
ric,
an
d
Hash
f
un
ct
ion
s)
,
a
nd
ty
pe
of
ap
plica
ti
on
s
.
T
he
re
are
seve
ral
m
et
ho
ds
to
ob
t
ai
n
valid
data
to
determ
ine
the
value
of
each
ind
ex
,
the
m
o
st
i
m
po
rtant
of
wh
ic
h
are:
ow
n
us
e
,
exp
e
rim
ents
&
te
sts,
si
m
ul
at
ion
s,
obse
rvat
ion
s,
dial
ogue
s,
structu
re
inter
views,
a
nd
qu
est
io
n
nai
re
s
[27]
.
Figure
1
s
hows
the
reli
abili
ty
of each
of the
s
e m
e
tho
ds, a
nd
in
this
p
a
per, t
he
o
bse
r
vations m
et
ho
d
is
us
e
d.
In
this
reg
a
rd,
we
trie
d
to
us
e
diff
e
ren
t
s
our
ces
ov
e
r
a
rela
ti
vely
lon
g
pe
r
iod
of
ti
m
e,
fr
om
19
78
to
2019. T
he
reas
on
for
this is t
he
existe
nce of
essenti
al
p
rinci
ples in
the d
esi
gn
of
cry
ptogr
aph
ic
alg
or
it
hm
s
that
are
sti
ll
us
e
d
ov
e
r
ti
m
e.
Fin
al
l
y,
Goo
gle
S
cho
la
r
was
c
hose
n
as
a
t
oo
l
that
pro
vid
es
be
nef
ic
ia
l
sta
ti
sti
cal
inf
or
m
at
ion
in t
he
fiel
d o
f var
iou
s
sci
ences
, in
cl
udin
g
c
rypt
ogra
ph
y.
The
key
word
s
«
cryp
tograp
hy alg
or
i
thm
»
and
«
cry
ptogra
ph
ic
al
gorithm
»
wer
e
us
e
d
to
extract
valid
pap
e
rs
an
d
re
ports
f
ro
m
this
database
.
The
init
ia
l
crit
erion
f
or
se
le
ct
ing
pa
pe
rs
with
the
a
bove
keyw
ords
was
the
m
ini
m
u
m
nu
m
ber
of
ci
ta
ti
on
s
to
that
pa
per
or
repor
t.
D
e
pe
nding
on the
yea
r
of
publica
ti
on
,
the m
ini
m
u
m
nu
m
ber
of c
it
at
ion
s
v
a
ried
ac
c
ordin
g
t
o
Ta
bl
e 1
.
Af
te
r
r
evie
wing
the
co
ntent
of
17
42
pap
e
r
s
and
ext
racted
repo
rts,
in
the
ne
xt
ste
p,
863
it
em
s
that
wer
e
directl
y
r
el
at
ed
to
the
de
sign
of
c
rypt
ogra
ph
ic
al
gor
it
h
m
s
wer
e
sel
ect
ed
an
d
us
e
d.
Their
fr
e
que
ncy
in
te
rm
s
of
publica
ti
on
in
re
puta
ble
sources
is
sh
ow
n
in
Fig
ure
2.
As
ca
n
be
seen,
62%
of
the
pa
per
s
us
e
d
wit
h
the
sp
eci
fie
d
num
ber
of
ci
ta
ti
on
s
i
n
Table
1
hav
e
be
en
publishe
d
in
f
our
authorit
at
ive
sci
entifi
c
ref
ere
nces:
IEEE
(
30%)
,
S
pr
i
ng
e
r
(
17
%
),
Else
vier
(13%
),
an
d
ACM
(
2%
).
Ot
her
doc
um
ents
and
re
ports
we
r
e
extr
act
ed
from
r
epu
ta
ble sour
ce
s s
uch a
s NIST,
I
T
U, a
s w
el
l as i
nter
na
ti
on
a
l c
om
pet
it
ion
s s
uch as
ECR
YP
T.
Figure
1.
Re
li
abili
ty
, d
epe
nding o
n
t
he
in
ves
ti
gation
m
et
hod use
d
[
27]
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
23
, N
o.
1
,
Ju
ly
2021
:
54
0
-
54
8
542
Figure
2.
P
erce
ntage
of c
on
si
de
rin
g publi
sh
e
d pap
e
rs
i
n var
iou
s
jo
urnals
Table
1.
N
um
ber
of
pa
per
s
, p
ub
li
cat
io
n
ye
ar
, and n
um
ber
of tim
es o
f
ci
ta
tio
ns
Year
Nu
m
b
er
Citatio
n
Year
Nu
m
b
er
Citatio
n
Year
Nu
m
b
er
Citatio
n
Year
Nu
m
b
er
Citatio
n
1978
-
1
9
9
9
28
23
2005
55
30
2011
144
10
2017
88
7
2000
47
20
2006
66
30
2012
163
10
2018
71
5
2001
54
30
2007
66
30
2013
154
10
2019
63
5
2002
57
30
2008
48
30
2014
134
13
2003
61
30
2009
71
30
2015
112
10
2004
54
30
2010
73
30
2016
133
10
3.
E
X
T
R
AC
TI
O
N
O
F
COMP
ONEN
T
S
3.1.
The
pur
po
ses
of d
e
sig
ning
cr
ypt
og
r
ap
hic
algorit
h
ms
On
e
of
the
m
os
t
essenti
al
com
po
nen
ts
in
de
sign
an
d
im
pl
e
m
entat
ion
of
crypto
gr
a
phic
al
gorithm
s
is
the
go
al
/
go
al
s
of
desig
ner
s
of
it
s
i
m
p
lem
ent
at
ion
.
T
he
tren
d
towa
r
ds
cryp
tograp
hy
in
ne
w
ap
plica
ti
on
s
su
c
h
as
cl
ou
d
c
ompu
ti
ng,
I
oT
,
and
re
source
-
c
onstrai
ne
d
de
vi
ces
requires
that
in
desig
nin
g
a
nd
im
ple
m
enting
crypto
gr
a
phic
al
gorithm
s,
m
any
n
ew
nece
ssit
ie
s
sh
oul
d
be
c
onside
red.
To
ac
hieve
t
his,
by
rev
ie
w
ing
the
sel
ect
ed
sourc
es,
12
ge
ner
al
go
al
s
for
desi
gnin
g
crypt
ogra
ph
ic
al
gorit
hms
wer
e
e
xtracte
d
.
Diff
e
ren
t
ty
pes
of
extracte
d
goal
s
an
d
th
ei
r
frequ
e
ncy
a
re
s
how
n
in
Ta
ble
2
.
O
bvio
us
ly
,
in
m
os
t
cases,
the
nece
s
sit
y
of
desig
ning
a
n
al
gorithm
is
to
achieve
se
ve
r
al
go
al
s
sim
ultan
eousl
y.
For
e
xam
ple,
the
pur
po
s
e
of
desig
ni
ng
an
al
gorithm
cou
ld
be
to
ac
hiev
e
hig
h
s
pee
d,
adequate
secu
r
it
y,
and
high
f
le
xib
il
it
y
us
ing
va
rio
us
te
ch
niques
su
c
h
as
Self
-
st
abili
zi
ng
te
ch
ni
qu
es
[28
]
,
[
29]
,
CNN
m
e
thod
[30
]
,
[
31]
,
i
m
age
and
sig
na
l
pr
oces
sin
g
[
32
]
-
[
34]
,
hybri
d
m
et
ho
ds
[
15
]
a
nd s
o o
n,
at
t
he
sam
e tim
e.
As
can
be
see
n,
the
secu
rity
com
po
ne
nt
with
516
it
em
s
h
as
the
highest
re
pe
ti
ti
on
a
m
on
g
oth
e
r
goal
s,
wh
ic
h
i
nd
ic
at
e
s
that
t
he
pr
i
m
ary
pur
po
se
of
desi
gnin
g
t
he
e
ncr
y
ption
al
gorithm
was
to
i
ncr
ease
se
cur
it
y,
wh
ic
h
is
obvious.
Usab
il
it
y
and
s
pee
d
goal
s
are
in
seco
nd
and
thi
rd
place
after
secu
rity
.
In
ot
her
words,
the
biggest
co
ncern
of
al
gorithm
desig
ners
is
to
increase
the
s
e
cur
it
y
of
c
rypt
ogra
ph
ic
al
gori
thm
s
based
on
their
sp
eci
fic
us
es
a
nd
al
so
to
incr
ease
sp
e
ed
.
Fi
gure
3
s
hows
t
he
fr
e
que
ncy
of
each
ta
r
get
i
n
t
he
sel
ect
ed
sta
ti
sti
cal
popula
ti
on
.
By
us
in
g
t
he
di
m
ension
reducti
on
te
ch
nique
[35
]
-
[
37]
,
t
he
t
otal
num
ber
of
com
pone
nts
(goals)
is
reduce
d
to
8 co
m
po
nen
ts.
In t
his r
e
ga
rd,
we rem
ov
e so
m
e of them
in
the
w
ay
:
a.
Since
the
cost
in
design
i
ng
the
al
gorithm
include
s
com
pu
ta
ti
on
al
over
head,
ba
ndwidt
h,
CPU
usa
ge
,
m
e
m
or
y
us
age
,
an
d
occ
upat
ion
le
vel
in
ha
r
dw
a
re
cry
ptog
raphy,
an
d
al
l
of
the
se
in
dicat
or
s
are
seen
i
n
resou
rce
us
age
, s
o t
he
“
cost
r
edu
ct
io
n
”
com
pone
nt is int
e
grat
ed
i
nto
t
he
“
resou
rce
us
age
”
com
po
ne
nt.
b.
Since
im
pr
ov
i
ng
im
age
qu
al
it
y
and
perf
or
m
ance
is
to
incr
ease
perform
a
nce,
these
tw
o
com
po
ne
nts
ar
e
integrate
d
int
o t
he
pe
rfo
rm
ance co
m
po
ne
nt.
c.
Since
the
pr
i
m
ary
pu
r
pose
of
al
l
al
gori
thm
s
is
to
increase
pe
rfo
r
m
anc
e
by
re
du
ci
ng
res
our
ce
consum
ption
,
ease
of
im
ple
m
entat
ion
an
d
increasi
ng
s
peed,
sec
ur
it
y,
reli
abili
ty
,
f
le
xib
il
it
y,
and
scal
abili
ty
,
by
rev
ie
wing
relat
ed
pap
e
rs
(36
pap
e
rs
),
al
l
of
them
wer
e
m
er
ged
into
t
he
a
bove
-
m
entioned
com
po
ne
nts
ba
sed o
n
the
expl
ic
it
ness
of the
text, e
xcep
t
for
six
pap
e
rs.
Table
2
.
G
oal
of crypt
ogra
phy al
gorithm
d
esi
gn and t
heir f
reque
ncy
Go
al
Frequ
en
cy
Go
al
Frequ
en
cy
Go
al
Frequ
en
cy
Secu
rity
516
Flex
ib
ility
45
Sp
eed
247
Use o
f
Reso
u
rce
91
Scalab
ility
22
Reliab
ility
11
Decr
ease
Co
st
9
Perf
o
r
m
an
ce
36
Usab
ility
337
Si
m
p
licit
y
38
I
m
ag
e
Qu
ality
9
Fu
n
ctio
n
I
m
p
rov
in
g
1
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
alysis of
des
ign
goals
o
f c
r
ypto
graphy
algorit
hms
ba
s
ed
on
… (
Ali
M
ohamm
ad Nor
ouz
za
de
h Gil
M
olk
)
543
Figure
3.
Perce
ntage
of the
go
al
o
f
crypt
ogra
ph
y al
gorithm
d
esi
gn
Finall
y,
from
the
rem
ai
nin
g
814
pa
pe
rs,
doc
um
ents,
an
d
te
chn
ic
al
repo
rts,
ei
ght
m
ai
n
obj
ect
ives
f
or
the
de
sig
n
of
crypto
gr
a
phic
al
gorithm
s
were
extracte
d.
Ta
ble
3
s
hows
t
he
se
ob
j
ect
ives
and
their
f
requ
ency
and
f
reque
ncy
per
ce
ntage
in
a
total
of
814
pa
per
s
.
T
he
num
ber
an
d
pe
rcent
age
of
ei
gh
t
goal
s
at
diff
e
re
nt
tim
e
intervals a
re sh
own
i
n
Ta
ble
4 an
d
i
ts c
har
t i
n
Fi
gure
4.
Table
3.
Ei
ght
go
al
s
of c
rypto
gr
a
phy al
gorith
m
s d
esi
gn
a
nd
their
per
ce
ntag
e of fre
qu
e
ncy
Ro
w
Ind
ex
Na
m
e
Nu
m
b
e
r
Percentag
e
Ro
w
Ind
ex
Na
m
e
Nu
m
b
e
r
Percentag
e
1
Secu
rity
516
6
3
.4
5
Flex
ib
ility
45
5
.5
2
Op
ti
m
u
m
us
e
of
r
eso
u
rces
81
10
6
Scalab
ility
22
2
.7
3
Usab
ility
338
4
1
.5
7
Sp
eed
247
3
0
.3
4
Si
m
p
licit
y
38
4
.7
8
Reliab
ility
11
1
.4
Table
4.
N
um
ber
s
a
nd p
e
rce
ntage of
eig
ht go
al
s o
f
en
c
rypti
on alg
or
it
hm
desi
gn in dif
fer
e
nt p
e
rio
d of t
im
e
Year
s
Total
Secu
rity
Usab
ility
Sp
eed
Res
o
u
rce
Flex
ib
ility
Simplicity
Scalab
ility
Reliab
ility
#
#
%
#
%
#
%
#
%
#
%
#
%
#
%
#
%
1978
-
2
0
0
0
31
14
4
5
.16
12
3
8
.71
12
3
8
.71
2
6
.45
5
1
6
.13
4
1
2
.9
2
6
.45
1
3
.23
2001
-
2
0
0
5
121
67
5
5
.37
33
2
7
.27
50
4
1
.32
12
9
.92
7
5
.79
2
1
.65
5
4
.13
1
0
.83
2006
-
2
0
1
0
145
88
6
0
.69
65
4
4
.83
39
2
6
.9
15
1
0
.34
16
1
1
.03
5
3
.45
7
4
.83
1
0
.69
2011
-
2
0
1
5
316
203
6
4
.24
132
4
1
.77
86
2
7
.22
33
1
0
.44
11
3
.48
17
5
.38
6
1
.9
6
1
.9
2016
-
2
0
1
9
201
144
7
1
.64
96
4
7
.76
99
2
9
.85
19
9
.45
6
2
.99
10
4
.98
2
0
.99
2
0
.99
Figure
4
.
Dia
gra
m
o
f
t
he perc
entage
of the
st
at
e o
f
goals
of
crypto
gr
a
phy a
lgorit
hm
d
esi
gn in
a
per
i
od of
tim
e
As
ca
n
be
see
n,
t
he
th
ree
m
ai
n
goal
s
of
al
gorithm
desig
ner
s
that
a
re
f
ar
a
head
of
oth
er
goal
s
a
r
e
secur
it
y,
us
abi
li
ty
,
and
spe
ed
.
Secu
rity
,
w
hi
ch
is
the
m
os
t
cru
ci
al
goal
in
crypt
ogra
phy,
has
al
ways
bee
n
grow
i
ng,
an
d
ot
her
goal
s
hav
e
change
d
as
ne
eded.
Since
20
05,
the
us
abili
ty
go
al
has
rece
ived
m
or
e
at
te
ntion.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
23
, N
o.
1
,
Ju
ly
2021
:
54
0
-
54
8
544
Obviously
,
wit
h
the
em
erg
en
ce
of
ne
w
us
es
,
desig
ning
an
d
i
m
ple
m
enting
al
gorithm
s
based
on
ne
w
h
ar
dw
a
re
and
s
of
twa
re
c
onditi
ons
is
one
of
the
m
os
t
crit
ic
al
chall
enges
f
or
desi
gn
e
r
s.
F
or
exam
ple,
with
the
ad
ve
nt
of
Io
T
,
wh
ic
h
is
i
nh
e
re
ntly
vu
l
ne
rab
le
t
o
a
va
riet
y
of
se
cu
rity
threats
[38
]
,
[
39]
,
du
e
to
it
s
a
pp
li
cat
io
n
in
va
rio
us
fiel
ds
of
healt
h
[40]
,
ag
ricul
ture
[
41
]
,
in
dustry
[42]
an
d
so
on
,
there
is
a
risk
of
in
for
m
at
ion
le
akage,
or
it
cou
l
d
dam
age
the
eco
nom
y
if
the
nece
ssary
secur
it
y
m
easur
es
are
not
ta
ke
n
[43
]
,
[
44]
.
Su
c
h
th
reats
m
ay
be
consi
der
e
d
as
on
e
of
t
he
m
os
t
i
m
po
rta
nt
obsta
cl
es
to
the
de
velo
pm
ent
of
I
oT
[45
]
,
[
46]
.
It
is
al
so
obser
ve
d
that
the
op
ti
m
al
us
e
of
res
ources
has
rece
ived
m
or
e
at
ten
ti
on
ov
e
r
ti
m
e
[47
]
,
[
48]
,
and
this
is
due
to
the
dev
el
op
m
e
nt
of
wireless
net
works
with
li
m
it
ed
reso
urce
s,
the
I
nter
net
of
T
hings,
a
nd
the
increasi
ng
us
e
of
sens
or
s
.
T
he
i
nter
net
in
it
ia
lly
con
sist
ed
of
only
a
s
m
al
l
cl
ou
d
with
on
ly
a
few
int
ercon
nected
ne
tworks
.
At
the
ti
m
e,
al
l
th
at
was
done
f
or
r
outi
ng
wa
s
t
o
def
i
ne
the
no
des
of
these
fi
nite
netw
orks
and
m
ake
co
nnect
ion
s
betwee
n
them
.
But
the
I
nter
ne
t
has
not
rem
ai
ned
sm
al
l,
and
a
great
er
c
om
bin
at
ion
of
ne
tworks
has
e
m
erg
ed
on
t
he
I
nter
net,
wh
ic
h
re
quire
s
a
dynam
ic
routing
syst
em
to
com
m
un
ic
at
e.
As
a
resu
lt
,
a
new
e
xter
nal
r
ou
ti
ng
protoc
ol
was
de
fine
d
that
pr
ovide
d
scal
abili
ty
capab
il
it
ie
s.
The
scal
abili
ty
of
t
he
BGP
pr
oto
c
ol
al
lowe
d
it
to
perform
su
ch r
ou
ti
ng
well
, alt
hough sec
ur
it
y an
d data p
r
otect
ion
is
of h
i
gh sig
nificance
[
49
]
-
[
52]
.
Anothe
r
issue
is
the
si
m
ultan
eous
co
ns
ide
ra
ti
on
of
two
m
ai
n
go
al
s
in
th
e
desig
n
of
c
r
yptogra
ph
ic
al
gorithm
s
.
Ac
cordin
g
t
o
Ta
bl
e
5,
the
t
wo
goal
s
of
us
a
bili
ty
and
sec
ur
it
y
hav
e
the
m
os
t
in
com
m
on
.
T
he
tw
o
go
al
s
of
sec
ur
i
ty
and
s
pee
d
a
re
in
s
eco
nd
pl
ace,
an
d
t
he
t
wo
goal
s
of
usa
bili
ty
and
s
pe
ed
are
in
t
hir
d
place,
and
us
a
bili
ty
and
resou
rces
are
in
the
four
t
h
pla
ce.
T
he
diagr
am
of
the
two
-
by
-
t
w
o
i
m
po
rta
nt
goal
s
of
secur
it
y, s
pee
d, usa
bili
ty
, and use
of r
es
ource
s at dif
fer
e
nt ti
m
e intervals is
sh
ow
n
in
Fi
gur
e 5
.
Table
5.
Fr
e
quency o
f g
oals in
a m
utu
al
way
Secu
rity
Si
m
p
licit
y
Reliab
ility
Scalab
ility
Use o
f
Res
o
u
rce
Flex
ib
ility
Sp
eed
Usab
ility
Secu
rity
-
23
7
5
17
14
85
205
Si
m
p
licit
y
23
-
1
1
5
4
8
13
Reliab
ility
7
1
-
0
0
1
3
3
Scalab
ility
5
1
0
-
1
5
5
5
Use o
f
Reso
u
rce
17
5
0
0
-
7
34
41
Flex
ib
ility
14
4
1
5
7
-
16
15
Sp
eed
85
8
3
5
34
16
-
73
Usab
ility
204
13
3
5
41
15
73
0
Figure
5
.
Dia
gra
m
o
f
t
he perc
entage
of the
goals the
secu
rity
-
sp
ee
d
a
nd us
e
-
op
ti
m
u
m
u
se of r
e
source
in
case
of sh
a
rin
g pair
wise
As
can
be
see
n,
the
two
sp
ee
d
-
us
a
bili
ty
go
al
s
hav
e
gro
w
n
ste
adily
since
20
15.
T
he
reas
on
for
this
is
the
em
erg
ence
of
ne
w
us
es
,
especial
ly
m
ob
il
e
us
a
bili
ty
,
and
the
i
ncr
ea
se
in
the
sp
e
e
d
of
a
ppli
cat
ion
s
a
nd
com
m
un
ic
at
ion
netw
orks.
T
he
la
g
of
t
he
c
rypto
gr
a
phy
s
pe
ed
le
a
ds
to
le
ss
use
of
it
a
nd
ultim
at
ely
increases
insecu
rity
.
Be
cause
of
t
his,
s
peed
ha
s
been
one
of
the
m
os
t
im
po
rtant
go
al
s
in
rece
nt
ye
ars.
The
un
ifor
m
grow
t
h
of
opti
m
u
m
us
e
of
re
so
urces
-
s
pee
d
is
in
the
sam
e
directi
on.
T
he
increasin
g
us
e
of
m
ob
il
e
networks
and
ty
pes
of
e
qu
i
pm
ent
that
hav
e
lim
it
ed
resour
ces
has
c
ause
d
these
two
com
m
on
goal
s
to
at
tract
m
or
e
at
te
ntion
f
ro
m
desig
ners
of
c
r
yptogra
ph
ic
al
gorithm
s
in
recent
ye
ars.
Be
tween
2010
an
d
2015,
s
har
e
d
go
al
s
of
sec
uri
ty
-
us
a
bili
ty
hav
e
de
creased
,
a
nd
s
ecur
it
y
sp
ee
d
has
inc
rease
d.
The
m
os
t
i
m
portant
reason
is
the
increase
in
the
sp
eed
of
com
m
un
ic
at
ion
networks
an
d,
co
ns
e
qu
e
ntly
,
ap
plica
ti
on
s
that
increase
the
ne
ed
f
or
high
-
s
pee
d use
.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
alysis of
des
ign
goals
o
f c
r
ypto
graphy
algorit
hms
ba
s
ed
on
… (
Ali
M
ohamm
ad Nor
ouz
za
de
h Gil
M
olk
)
545
3.2.
Usage
of
cryp
togr
ap
hic
a
lg
orit
hms
Re
gardin
g
the
us
e
of
c
rypto
grap
hic
al
gorith
m
s,
18
dif
fer
e
nt
us
es
we
re
e
xtracted
from
the
existi
ng
sta
ti
s
ti
cal
co
m
m
un
it
y,
of
w
hich
m
ultim
e
dia
us
e
with
163
re
petit
io
ns
is
the
m
ost
pract
ic
al
goal
of
crypto
gr
a
phic
al
gorithm
design
e
rs.
Fig
ur
e
6
s
hows
t
he
ty
pes
of
us
es
with
their
f
requen
cy
i
n
the
e
xisti
ng
sta
ti
sti
cal
co
m
m
un
it
y.
As
can
be
see
n,
the
first
seve
n
use
s
are
ap
plica
ti
on
s
in
m
ultim
edia
env
ir
on
m
ents,
wireless
netw
orks
,
cl
oud
en
vi
ronm
ents,
lim
i
te
d
res
ources,
Io
T
,
m
edical
us
es,
an
d
real
-
ti
m
e
app
li
cat
ions.
The
gr
a
ph
of
the
s
ta
tus
of
these
seve
n
sign
ific
ant
us
es
at
dif
fer
e
nt
tim
e
int
erv
al
s
is
show
n
in
Fig
ur
e
7
.
It
is
no
te
worthy
th
at
cryptogra
phic
al
go
rithm
design
e
rs
ha
ve
consi
der
e
d
the
us
e
of
the
cl
oud
e
nv
ir
onm
ent
f
or
crypto
gr
a
phic
al
gorithm
s
sin
ce
2010
a
nd
I
oT
since
20
12.
Also
,
si
nce
2015,
m
ultim
e
dia
us
es,
I
oT
,
an
d
m
edical
app
li
cat
ion
s
ha
ve
be
en
on
the
rise. D
u
e
to
I
oT
in m
edici
ne
and
the
sensiti
vity
of
m
edical
info
r
m
at
ion
confide
ntial
it
y,
one
of
t
he
m
os
t
crit
ic
al
con
c
ern
s
of
cry
ptogra
phic
al
gorithm
design
e
rs
t
od
ay
is
t
he
des
ign
of
al
gorithm
s f
or
encr
y
pting m
e
dical
infor
m
at
i
on
[53
]
-
[
56]
.
Figure
6
.
Fr
e
quency
of
diff
e
r
ent cry
ptogra
phy al
gorithm
s d
esi
gn
us
a
ge
Figure
7
.
Dia
gra
m
o
f
t
he prim
ary us
e
s
of
dif
f
eren
t c
rypto
gra
ph
y al
gorithm
s
d
esi
gn
3.3.
O
pt
im
al
use of re
sourc
es
Anothe
r
crit
ic
al
go
al
of
crypt
ogra
ph
ic
al
gori
thm
design
ers
is
to
desig
n
an
al
go
rithm
that
us
es
fe
we
r
resou
rces
a
fter
i
m
ple
m
entat
ion
a
nd
at
r
unti
m
e.
A
cco
r
ding
to
a
st
ud
y
c
on
du
ct
e
d
in
this
s
ta
ti
sti
ca
l
com
m
un
it
y,
the
esse
ntial
so
urces
c
onside
red
by
cry
ptogra
phic
al
gorithm
design
e
rs
are
ha
r
dw
a
re,
m
e
m
or
y,
band
width,
powe
r
c
on
s
umpti
on,
a
nd
occ
up
a
ncy
le
vel.
The
pe
rcen
ta
ge
of
eac
h
of
t
he
a
bove
sou
r
ces
in
t
he
d
esi
gn
of
crypto
gr
a
phic
al
gorithm
s
is
sh
ow
n
in
Fig
ure
8.
As
can
be
see
n,
since
20
05,
the
two
sourc
es
of
m
e
m
or
y
and
hardware
hav
e
been
on
the
rise
and
hav
e
recei
ved
m
or
e
at
te
ntion
.
Acc
ordin
g
t
o
t
he
diag
ram
in
Figure
8
,
ene
r
gy
co
nsum
ption
is
m
or
e
c
ons
idere
d
by
al
gorithm
design
e
rs.
O
ne
of
t
he
m
os
t
i
m
portant
reason
s
for
inc
reasin
g
I
oT
sec
uri
ty
is
that
they
are
ver
y
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
23
, N
o.
1
,
Ju
ly
2021
:
54
0
-
54
8
546
vu
l
ner
a
ble
to
a
tt
acks
[
57
]
.
Al
so
,
due
to
the
wireless
c
omm
un
ic
at
io
n
e
nv
i
r
on
m
ent,
lim
it
e
d
power
res
ou
rces,
and
lo
w
com
pu
ta
bili
ty
,
the
i
m
ple
m
entat
ion
of
co
nventio
na
l
secur
it
y
al
go
rithm
s
will
le
ad
to
obsta
cl
es
in
their
perform
ance
[58]
.
T
his
sugge
sts
that
in
the
fu
t
ur
e,
the
us
e
of
res
ources
as
an
i
m
po
rtant
f
act
or
in
the
des
ign
of
crypto
gr
a
phic
al
gorithm
s sh
ould
be se
rio
us
l
y consi
der
e
d
.
Figure
8
.
Dia
gra
m
o
f
t
he perc
entage
of the
di
ff
ere
nt r
e
sourc
es of c
rypto
gr
a
ph
y al
gorithm
d
esi
gn
4.
CONCL
US
I
O
N
In
this r
e
searc
h, by r
evie
wing
m
or
e than
1700 p
a
per
s
, tech
ni
cal
r
eports, and docu
m
ents pub
li
s
hed
by
internati
onal
orga
nizat
ion
s
f
or
the
desi
gn
a
nd
im
ple
m
entat
i
on
of
c
rypto
gr
aph
ic
al
gorith
m
s,
it
was
concl
ud
e
d
that
the
m
ai
n
go
al
s
of
de
sig
ner
s
in
orde
r
of
their
pri
ori
ty
are
increasi
ng
secur
it
y,
at
te
ntion
to
us
e,
inc
r
easi
ng
sp
ee
d
an
d
op
ti
m
al
us
e
of
res
ources,
sim
pli
ci
ty
,
increasin
g
fle
xib
il
it
y,
scal
abili
ty
,
and
reli
abili
ty
.
R
egar
di
ng
the
op
ti
m
al
us
e
of
r
es
ources
,
du
e
to
the
a
dvancem
ent
of
te
chnolo
gy
an
d
the
em
erg
en
ce
of
com
m
un
ic
at
ion
netw
orks
with
new
featu
res,
the
res
ources
con
si
der
e
d
ba
sed
on
pr
i
or
i
ty
are
power
consum
ption
,
lowe
r
occupa
ncy
le
ve
l,
m
e
m
or
y
us
age,
ba
ndwidt
h
us
a
ge,
a
nd
ha
rdwar
e
usa
ge
.
Acc
ord
in
g
t
o
the
gi
ven
sta
ti
sti
cs
in
this
pap
e
r,
due
to
the
new
nee
ds
of
us
e
rs
in
va
rio
us
fiel
ds
,
s
ever
al
us
e
s
of
t
hese
crypt
ogra
ph
ic
al
gorithm
s
that
desig
ners cons
ider
in ord
e
r
of p
rio
rity
are
m
ultim
edia u
ses, w
irel
ess n
et
w
orks,
clo
ud com
pu
ti
ng
, envir
on
m
ent
wit
h
li
m
it
ed
re
so
urces
,
I
oT,
m
edical
us
e,
a
nd
real
-
ti
m
e
app
li
cat
ion
s.
T
he
refor
e
,
to
desi
gn
ne
w
c
rypto
gr
a
phic
al
gorithm
s,
pr
im
ary
go
al
s
an
d
te
chn
ic
al
re
qu
i
rem
ents
m
u
st
be
con
si
dered.
T
he
desire
d
al
gorithm
mu
st
be
desig
ne
d
an
d
im
ple
m
ented
ba
sed
on
these
so
tha
t
in
add
i
ti
on
to
the
m
a
nag
em
ent
of
r
equ
i
red
hardware
an
d
so
ft
war
e
r
es
ou
rces,
t
hey can
hav
e
m
or
e fle
xi
bili
ty
in
new a
pp
li
cat
io
ns
.
REFERE
NCE
S
[1]
L.
J
.
Fenne
lly
,
M.
Bea
udr
y
,
and
M.
A.
Perr
y
,
Se
curit
y
in
2025
,
AS
IS Int
ern
at
ion
al
,
2017
.
[2]
P.
Koche
r,
R
.
L
e
e,
G.
McGraw
,
A.
Raghuna
th
an,
and
S.
Ravi,
“
Secur
i
t
y
as
a
n
ew
dimension
in
embedde
d
s
y
s
te
m
design,
”
in
Proc
.
-
Des.
Aut
om
.
C
onf.
,
2004,
pp.
7
53
-
760,
doi
:
10
.
1145/996566.
99
6771.
[3]
Sourabh
Bhat
,
a
nd
Vivek
Kapoor
“
Secur
e
and
ef
fic
i
ent
data
priv
acy
,
aut
hen
ti
c
at
i
on
and
int
egr
i
t
y
sche
m
es
using
h
y
brid
cr
y
ptogr
aph
y
,
”
i
n
Kamal
R.,
Henshaw
M.
,
Nair
P.
(
eds
)
Inte
rnational
Confe
renc
e
on
Adv
anc
e
d
Computing
Networ
ki
ng
and
Informatic
s.
Adv
an
ce
s
in
Inte
lligen
t
Syst
ems
and
Computing
,
vol
870.
Springer,
Singapore
,
doi:
10.
1007/978
-
98
1
-
13
-
2673
-
8_30
.
[4]
O.
G.
Abood
,
and
S.
K.
Guirguis,
“
A
surve
y
on
cr
y
ptogr
aph
y
al
go
rit
hm
s,
”
Int.
J.
S
ci
.
R
es.
Pub
l.
,
vol.
8,
no.
7
,
Ju
l
.
2018,
doi
:
10
.
29
322/i
jsrp.
8
.
7.
201
8.
p7978.
[5]
A.
Ku
m
ar
Gupt
a,
P.
Mathur
,
an
d
P.
Vashishtha,
“
Com
par
at
ive
stud
y
of
cr
y
ptogr
aph
y
for
cl
oud
computing
for
dat
a
se
cur
ity
,
”
Rece
nt
A
dv.
Comput.
Sci
.
Com
mun.
,
vol.
12,
pp.
1
-
1
,
2019,
doi
:
10.
2174/266625
5813666190911114909.
[6]
K.
B.
Logunlek
o,
O.
D.
Adeniji
,
A.
Logunleko,
and
O.
State,
“
A
compara
ti
v
e
stu
d
y
of
s
y
m
m
et
ri
c
cr
y
p
togra
p
h
y
m
ec
hani
sm
on
D
ES
,
A
ES
and
E
B64
for
info
rm
ation
sec
ur
i
t
y
,
”
vo
l.
8
,
no
.
Febru
ar
y
,
pp
.
45
-
51
,
20
20.
[7]
A.
A.
Soofi,
I.
R
ia
z
,
and
U.
R
ashe
ed,
“
An
enha
n
c
ed
vige
n
ere
c
iph
er
for
data
sec
ur
it
y,
”
Int.
J.
S
ci.
Technol
.
Re
s.
,
vol.
4
,
no
.
8
,
pp
.
141
-
145,
2015
.
[8]
D.
Nile
sh
,
and
M.
Nagle
,
“
Th
e
new
cr
y
p
togra
p
h
y
a
lgori
thm
wi
th
high
through
put,
”
in
2014
In
t.
Conf
.
Comput
.
Comm
un.
Informatic
s
Us
hering
Technol
.
Tom
or
ro
w,
To
day,
ICCCI
2014
,
2014,
pp.
3
-
7,
doi
:
10.
1109/ICCCI.2014.6921739.
1
9
7
8
-2
0
0
0
2
0
0
1
-2
0
0
5
2
0
0
6
-2
0
1
0
2
0
1
1
-2
0
1
5
2
0
1
6
-2
0
1
9
Ha
r
d
ware
1
1
0
2
3
B
a
nd
wi
t
h
1
3
2
4
4
Mem
or
y
1
1
4
9
5
Oc
cupan
c
y Le
vel
0
6
7
6
2
Pow
er
Consum
pt
i
o
n
0
3
6
17
8
0
2
4
6
8
10
12
14
16
18
Number
Per
i
od
of T
i
me
Ha
r
d
ware
B
a
nd
wi
t
h
Mem
or
y
Oc
cupan
c
y Le
vel
Pow
er
Consum
pt
i
o
n
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
alysis of
des
ign
goals
o
f c
r
ypto
graphy
algorit
hms
ba
s
ed
on
… (
Ali
M
ohamm
ad Nor
ouz
za
de
h Gil
M
olk
)
547
[9]
A.
Vass
il
ev,
L.
Feldman,
and
G.
W
it
te
,
“
A
utomate
d
cr
y
p
togra
ph
i
c
validation
(AC
V)
te
sting,
”
in
I
TL
bull
et
in
for
Sept
embe
r 2018
,
pp.
1
-
4,
2018
.
[10]
M.
Nage
ndra
,
a
nd
M.
Chandr
a
Sekhar
,
“
Perform
anc
e
improve
m
ent
of
adv
anced
en
cr
y
pti
on
a
lgori
thm
using
par
allel
compu
ta
ti
on
,
”
Int
.
J
.
Soft
w.
Eng
.
it
s
Appl
.
,
v
ol.
8,
no.
2,
pp.
287
-
296,
2014,
doi:
10.
14257/ijseia.
2014.
8.
2
.
28.
[11]
Tha
l
es,
Globa
l
e
ncry
pti
on
trends
study
,
P
onemon Insti
tute
R
ese
ar
ch,
2018
.
.
[12]
Y.
Choi,
“
Cr
y
pt
ana
l
y
sis on
pr
ivac
y
-
awa
re
two
-
fa
ct
or authe
n
ti
c
at
i
on
protoc
ol
for w
ire
le
ss
sensor
net
works
,
”
In
t.
J
.
El
e
ct
r.
Comput.
Eng.
,
vol
.
8
,
no
.
1,
pp
.
605
-
610
,
2018,
doi
:
10
.
11
591/i
jece
.
v8i1
.
p
p605
-
610.
[13]
M.
A
.
A.
K.
Al
-
Dabba
s,
A.
Alab
ai
ch
i,
and
A.
S.
Abbas,
“
Dual
m
et
hod
cr
y
p
tograph
y
imag
e
b
y
t
wo
forc
e
sec
u
r
e
and
stega
nogra
p
h
y
sec
r
et
m
essage
in
IoT,
”
TEL
KOMNIKA
(
T
el
e
communic
ation
Computing
El
e
ct
ronics
an
d
Control)
,
vol. 18
,
no
.
6
,
pp
.
2928
-
2938,
2020
,
doi
:
10.
1
2928
/T
E
L
KO
MN
I
KA
.
v18i6.
15847.
[14]
R.
F.
Abdel
-
Kade
r,
S.
H.
El
-
S
her
if,
and
R
.
Y.
Riz
k,
“
Eff
i
ci
e
nt
two
-
stage
cr
y
ptogr
aph
y
s
ch
eme
for
sec
ure
distri
bute
d
da
ta
storage
in
cl
ou
d
computing,
”
Inte
rnational
Jo
urnal
of
El
ec
tri
cal
and
Computer
Engi
nee
rin
g
(
IJE
CE)
,
vo
l. 10
,
no
.
3
,
pp
.
3295
-
3306,
2020
,
doi
:
10.
11591
/i
j
ece.v10i3.
pp3295
-
3
306.
[15]
P.
Siva
Sank
aran
,
and
V.
B.
Ki
r
ubana
nd,
“
H
y
bri
d
cr
y
ptogr
aph
y
s
ec
uri
t
y
in
publ
ic
cl
oud
using
TwoFish
and
EC
C
al
gorit
hm
,
”
Inte
r
nati
onal
Journal
of
El
ectric
a
l
and
Computer
Engi
nee
ring
(
IJE
CE
)
,
vol.
9,
no.
4,
p
p.
2578
-
2584
,
2019,
doi
:
10
.
11
591/i
jece
.
v9i4
.
p
p2578
-
2584.
[16]
B.
Murugana
nt
ham,
P.
Sham
il
i,
S.
Gane
sh
K
um
ar,
and
A.
Murugan,
“
Quantum
cr
y
ptog
ra
ph
y
for
se
cur
e
d
comm
unic
at
ion
net
works
,
”
Int
ernati
onal
Journal
of
El
e
ct
rica
l
an
d
Computer
Engi
nee
ring
(
IJE
CE
)
,
vol.
10,
no
.
1,
pp
.
407
-
414
,
2020,
doi
:
10
.
11
591/i
jece
.
v10i1
.
pp407
-
414.
[17]
S.
M.
S.
Re
za
et
al.
,
“
Salsa20
ba
sed
li
ghtwe
ight
sec
urity
s
che
m
e
for
sm
art
m
et
er
comm
unic
at
ion
i
n
sm
art
grid
,
”
TEL
KOMNIKA
(
Tele
communic
ati
on
Co
mputing
El
e
ct
ronics
and
Control)
vol.
18,
no.
1
,
pp.
228
–
233,
2020,
doi
:
10.
12928/TELK
OM
NIK
A.V18I1.
14798.
[18]
J.
Za
le
ws
ki,
A.
J.
Kornec
ki,
B.
D.
Cze
jdo,
F.
G.
Gonza
lez,
N.
Subram
ani
an,
and
D.
Tra
wcz
y
nski
,
“
Curric
ulum
deve
lopment
for
embedde
d
s
y
st
ems
sec
ur
ity
,
”
i
n
2014
ASE
E
A
nnual
Confe
ren
ce
&
Ex
positi
on,
Indianapol
is,
Indiana
,
do
i:
10.
18260/1
-
2
--
2023
7
.
[19]
A.
Sharm
a,
“
Com
par
at
ive
stu
d
y
of
s
y
m
m
et
r
ic
cr
y
p
togra
ph
y
al
gori
thm
,
”
th
esis
Facul
t
y
of
Engi
ne
eri
n
g
,
Depa
rtment
of
Com
pute
r
Scie
n
ce
&
Engi
n
ee
r
i
ng
,
Paci
fi
c
Uni
ver
sit
y
(PA
HER),
Udaipur
(R
aj
asth
an)
,
2014
.
[Online
]
.
Ava
il
able:
h
tt
ps:/
/
ww
w.re
sea
rch
ga
te
.
n
et
/pub
li
c
atio
n/286863418_
co
m
par
at
ive
_stud
y_of_s
y
m
m
et
ric
_cr
y
p
togra
ph
y
_
a
lgori
thm
,
do
i: 10
.
13140/RG.
2.
1
.
1
031.
5601.
[20]
Lay
l
a
Pournaja
f
,
Farna
z
T
ahmasebi
an
,
L
i
Xiong
,
Vaid
y
Sunde
ram
,
and
C
y
rus
Shahabi
,
“
Privacy
pre
servi
n
g
rev
erse
k
-
Ne
are
s
t
Neighbor
qu
eries
,
”
In
2018
19
t
h
IEEE
Int
ernational
Confe
ren
ce
on
Mobile
Data
Manage
men
t
(
MDM
)
,
2018,
d
oi:
10
.
1109/MDM
.
2018.
00035
.
[21]
Farna
z
Ta
hm
ase
bia
n,
L
i
Xiong,
Mani
So
toode
h,
and
Vaid
y
Su
nder
am
,
“
Crowds
ourc
ing
under
dat
a
poisonin
g
at
t
ac
ks:
A
com
par
ative
stud
y
,
”
In
IFI
P
Annual
Confe
renc
e
on
Data
and
Appl
ic
ati
ons
Sec
uri
t
y
and
Priv
ac
y
,
Spinger,
2020
,
p
p.
310
-
332
,
doi
:
10.
1007/978
-
3
-
0
30
-
49669
-
2_18
.
[22]
Bal
avi
v
eka
n
and
han,
A.
,
“
A
compara
t
ive
stud
y
o
f
cr
y
ptogr
aph
y
a
lgori
thm
in
d
at
a
sec
urity
for
soft
ware
,
”
Journa
l
of
th
e
Gujarat
R
ese
arch
Soc
iety
,
2019,
vol
.
21
,
pp
.
1904
–
1918
.
[23]
Navid
Abapour
,
A
y
na
z
Shafie
sa
bet
,
and
Rasoul
Mahboub
,
“
A
novel
sec
ur
ity
b
ase
d
routi
ng
m
e
thod
using
an
t
col
on
y
opt
imization
algorithms
and
RP
L
p
rot
ocol
in
the
Io
T
net
w
orks
,”
Ma
pta
Journal
of
El
e
ct
rica
l
and
Computer
Engi
n
ee
ring (
MJ
EC
E)
,
vol
.
3
,
no
.
1,
pp
.
1
-
9
,
2021
.
[24]
D.
Sehra
wat,
N.
S.
Gill
,
and
M.
Devi,
“
Com
par
at
ive
an
aly
sis
of
li
ghtwei
ght
blo
ck
ci
pher
s
in
IoT
-
ena
bl
ed
sm
art
envi
ronm
ent
,
”
i
n
2019
6th
Inte
rnational
Confe
r
enc
e
on
Signal
Proce
ss
ing
and
Inte
grated
Ne
tw
orks,
SPIN
2019
,
pp.
915
-
920
,
Ma
y
2019,
doi: 10.
1
109/SP
IN.2019.
8711697.
[25]
T.
Om
ran
i
,
R
.
Rho
um
a,
and
L.
Slim
an
.
“
Li
ghtwei
gh
t
cr
yptogra
ph
y
for
r
esourc
e
-
constr
ained
dev
ic
es:
A
compara
ti
v
e
stud
y
and
recta
ng
le
cr
y
pt
anal
y
s
is,
”
in
Le
ct
u
re
Notes
in
Business
Inf
orm
at
ion
Proce
ss
ing,
201
8,
vol.
325,
pp
.
107
-
11
8,
doi
:
10
.
1007/
978
-
3
-
319
-
97749
-
2_8.
[26]
S.
Ka
ur
,
and
S.
Kaur,
“
Com
par
at
iv
e
an
aly
sis
of
li
ghtw
ei
ght
cr
yptogra
ph
y
al
gori
thms
for
sm
art
grids,
”
in
4
th
IEE
E
Inte
rnat
io
nal
Confe
r
enc
e
on
Signal
Proces
sing,
Computin
g
and
Control
,
ISPCC
2017
,
Sep.
2017
,
vo
l
.
2017
-
Janua
r
y
,
p
p.
564
-
567
,
doi
:
10.
1109/ISP
CC.2017.
8269742.
[27]
S.
Ottosson,
D
ev
e
lopi
ng
and
Managing
Innov
ati
on
in
a
Fa
st
Changing
and
Complex
World
,
Springe
r
Inte
rna
ti
ona
l
Pu
bli
shing
,
2019
,
d
oi:
10
.
1007/978
-
3
-
319
-
94045
-
8
.
[28]
Ramtin
A.,
Hak
ami
V.,
Dehgh
a
n
M.
,
“
A
per
tu
r
bat
ion
-
proof
sel
f
-
stabi
lizing
al
g
orit
hm
for
const
ruc
ti
ng
v
irt
u
al
bac
kbones
in
wi
rel
ess
Ad
-
Hoc
n
et
works
,
”
i
n
Inter
nati
onal
Sympo
sium
on
Comput
er
Net
works
and
Distribute
d
Syste
ms
,
Com
pute
r
Networks
and
Distributed
S
y
stems
(
CND
S
2013
),
Com
m
unic
at
ions
in
Com
pute
r
an
d
Inform
at
ion
Sci
e
nce
,
2014,
vol
.
4
28
,
Springer
,
Ch
am
,
doi:
10.
1007
/978
-
3
-
319
-
1090
3
-
9_6
.
[29]
Am
irre
za
Ramti
n
,
Vesal
Haka
m
i
,
and
Mehd
i
Dehgha
n
,
“
A
self
-
stabilizing
cl
uster
ing
a
lgorithm
with
fau
lt
-
cont
a
inment
feature
for
wire
l
es
s
sensor
net
wor
ks
,
”
In
7'th
Inte
rnational
Symp
osium
on
Tele
c
omm
unic
ati
ons
(
IST'2014
)
,
2014,
doi
:
10
.
1109/IS
TE
L
.
2014.
7000
799
.
[30]
Ali
Jaha
nshah
i
,
Hadi
Za
m
ani
Sabzi
,
Chester
La
u
,
and
Daniel
W
ong
,
“
GPU
-
NEST:
ch
aracterizing
en
e
r
g
y
eff
iciency
of
m
ul
ti
-
GPU
infe
r
ence
serve
rs
,
”
IEEE
Computer
Arch
i
te
c
ture
Let
te
rs
,
v
ol.
19
,
no
.
2,
pp
.
139
-
142
.
[31]
Jaha
nshahi, A.
,
“
Ti
n
y
CNN
:
A Ti
n
y
Modular
CN
N Acc
elera
tor
fo
r
Embedde
d
FP
GA
,
”
2019,
arXi
v:1
911.
06777
.
[32]
Pourjaba
r,
S.,
a
nd
Choi,
G
.
S
.,
“
CVR:
A
Conti
nuousl
y
Vari
a
ble
Ra
te
LDPC
Dec
oder
Us
ing
Parity
Ch
eck
Ext
ension
for
Minim
um
La
te
nc
y
,
”
Journal
of
Signal
Proce
ss
i
ng
Syste
ms
,
pp.
1
-
8
,
2020,
doi:
10.
1007/s11265
-
020
-
01597
-
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
23
, N
o.
1
,
Ju
ly
2021
:
54
0
-
54
8
548
[33]
H.
A.
H.
Al
Na
ffa
kh,
R.
Ghaz
a
li
,
N.
K.
El
Ab
badi
,
and
A.
N.
Raz
za
q
,
“
A
rev
ie
w
of
hum
an
skin
det
ectio
n
appl
i
ca
t
ions
bas
ed
on
imag
e
pro
ce
ss
ing,
”
Bull.
El
e
ct
r.
Eng.
Inf
orm
ati
cs
,
vol
.
1
0,
no.
1,
pp.
12
9
-
137,
2021,
doi
:
10.
11591/eei
.
v1
0i1.
2497.
[34]
M.
Mous
sa,
“
A
n
it
er
at
iv
e
a
lgo
rit
hm
for
col
or
spac
e
opt
imization
on
image
segm
ent
at
ion
,
”
TEL
KOMNIK
A
(
Tele
communic
ati
on
Computing
El
e
ct
ronics
a
nd
Control)
,
vol.
19,
no
.
1,
pp.
199
-
20
5,
2020,
doi
:
10.
12928/TELK
OM
NIK
A.V19I1.
15122.
[35]
N.
V.
Thoa
i,
“
Crit
eria
and
di
m
ension
red
uct
i
on
of
li
nea
r
m
ult
iple
cri
t
eria
opti
m
iz
ation
proble
m
s,
”
J.
Glob
.
Optim.
,
vol.
52,
no.
3
,
pp
.
499
-
5
08,
2012
,
doi
:
10
.
1007/s10898
-
01
1
-
9764
-
4.
[36]
T.
Ga
l
,
and
H.
Le
b
erl
ing
,
“
Re
dundant
ob
je
c
tive
func
ti
ons
in
li
n
ea
r
vector
m
axi
m
um
proble
m
s
and
th
eir
det
ermina
ti
on,
”
Eur.
J
.
Op
er.
Res
.
,
vol
.
1
,
no
.
3
,
pp.
176
-
184
,
19
77,
doi
:
10
.
1016
/0377
-
2217(77)9
0025
-
X.
[37]
R.
Zha
ng
,
T
.
Du,
and
S.
Qu,
“
A
princ
ip
al
compo
nent
an
aly
sis
al
g
orit
hm
base
d
on
dimension
red
uc
ti
on
window,
”
IEE
E
Acce
ss
,
vo
l.
6
,
pp
.
63737
-
6
3747,
2018
,
doi
: 10.1109/
ACCESS
.
2018.
2875270.
[38]
E.
Hodo
et
al.
,
“
Thre
at
an
aly
sis
of
IoT
net
works
using
art
ifi
cial
neur
al
ne
twork
int
rusion
detec
t
i
on
sy
st
em,
”
in
2016
Int. Sy
mp
.
Net
works,
Comp
ut.
Comm
un.
IS
NCC 2016
,
2016
,
pp
.
4
-
8
,
doi
:
10
.
1109/ISNCC.20
16.
7746067.
[39]
S.
Baba
r
,
P.
Ma
hal
l
e,
A.
St
ango,
N.
Prasad,
and
R.
Prasad,
“
Propos
ed
sec
urit
y
m
o
del
and
threat
t
a
xonom
y
fo
r
th
e
Inte
rne
t
of
Thi
n
gs
(IoT
),
”
Comm
un.
Comput.
Inf.
Sci.
,
vo
l.
89
C
CIS,
pp.
420
-
429,
2010,
doi:
10
.
1007/978
-
3
-
642
-
14478
-
3_42.
[40]
A.
Alkha
yy
a
t,
A.
A.
Tha
b
it
,
F.
A
.
Al
-
Ma
y
a
li,
and
Q.
H.
Abbasi,
“
W
BS
N
in
IoT
h
ea
l
th
-
base
d
appl
i
ca
t
ion:
Towa
rd
del
a
y
and
energ
y
consum
pti
on
m
ini
m
iz
at
ion
,
”
J
.
Sensors
,
vo
l. 2
019,
2019
,
doi
:
1
0.
1155/2019/
250
8452.
[41]
M.
A
y
a
z,
M.
A
m
m
ad
-
Uddin,
Z.
Sharif,
A.
Ma
nsour,
and
E.
H
.
M.
Aggoune,
“
Inte
rne
t
-
of
-
Things
(IoT
)
-
base
d
sm
art
agr
ic
ult
u
r
e:
Towa
rd
m
ak
ing
the
fi
el
ds
t
al
k,
”
IEEE
Acc
ess
,
vol.
7,
pp
.
129551
-
129583,
2019,
doi:
10.
1109/ACCESS
.
2019.
2932609.
[42]
M.
Hasan,
M.
M.
Islam,
M.
I
.
I.
Z
ari
f
,
and
M.
M.
A.
Hashem
,
“
Atta
ck
and
ano
m
aly
detec
t
ion
i
n
IoT
sensors
in
IoT
site
s
using
m
ac
hine
learn
ing
appr
oa
che
s,
”
Inte
rn
et
of
Things
,
vol.
7
,
p.
100059,
Sep.
2019
,
doi
:
10.
1016/j.iot.20
19.
100059.
[43]
H.
J.
Ban,
J.
Choi,
and
N.
Kang,
“
Fine
-
gra
ine
d
support
of
sec
urity
serv
ices
for
resourc
e
constrai
ned
int
ern
et
of
thi
n
gs,
”
Int
.
J. Distrib.
S
ens.
N
etwor
ks
,
vol. 2016
,
20
16
,
doi
:
10
.
1
155/2016/
78246
86.
[44]
Shujaa
t
Khan
,
Mansoor
Ebra
hi
m
,
and
Kafe
e
l
Ahm
ed
Khan
,
“
Perform
anc
e
ev
al
u
at
ion
of
se
cur
e
f
orc
e
s
y
m
m
et
ri
c
ke
y
a
lgori
thm
,
”
i
n
Proc. I
nt
.
Mu
lti
-
Topic
Con
f.
(
IMTIC)
,
Pak
istan
,
2015
,
pp
.
11
-
13
.
[45]
L.
At
zor
i,
A.
I
er
a,
and
G.
Morab
it
o,
“
Th
e
Int
ern
e
t
of
Th
ings:
A
surve
y
,
”
Comput.
Net
works
,
vo
l.
54,
no.
15,
p
p
.
2787
-
2805,
201
0,
doi
:
10
.
1016/j.c
om
net.2010.
05
.
010.
[46]
M.
Ebra
h
im,
S.
Khan,
and
U.
Khali
d
,
“
Secur
i
t
y
r
i
sk a
naly
sis
in
p
e
er
2
p
ee
r
s
y
st
e
m
,
”
2012,
arXi
v:1
4
04.
5123
.
[47]
R.
J
y
oth
i
,
and
N.
G.
Choll
i
,
“
An
eff
icient
appr
oa
c
h
for
sec
ure
d
co
m
m
unic
at
ion
in
wire
le
ss
sensor
net
works
,
”
Int
.
J.
Elec
tr.
Compu
t.
Eng.
,
vo
l. 10,
no.
2
,
pp
.
1641
-
1647,
2020
,
doi
: 10.11591/
i
je
c
e.
v
10i2.
pp1641
-
16
47.
[48]
M.
N.
Hi
eu,
D.
H.
Ngoc,
C.
H.
Ngoc,
T
.
D
.
Ph
uong,
and
M.
T.
Cong,
“
New
pr
imiti
ves
of
cont
r
oll
ed
elem
ents
F2/4
for
blo
ck
c
iphe
rs,
”
Int
ernat
ional
Journal
of
Elec
tri
cal
and
Computer
Engi
n
ee
ring
(
IJE
CE)
,
vol.
10
,
no
.
5
,
pp.
5470
-
5478
,
2020,
doi
:
10
.
11
591/IJECE
.
V10I
5.
PP
5470
-
5478.
[49]
Fahimeh
Arab
,
Mohs
en
Kari
m
i
,
and
Se
y
ed
Mos
ta
fa
Safa
v
i
,
“
Anal
y
s
is
of
QoS
par
amete
rs
for
vide
o
tr
aff
ic
i
n
hom
epl
ug
AV
standa
rd
using
NS
-
3
,
”
In
2016
Smar
t
Gr
ids Conf
er
enc
e
(
SGC)
,
doi:
10.
1109/SGC.2
016.
7882949
.
[50]
Mohs
en
Kari
m
i
,
Ali
Jah
ansha
hi
,
Abbas
Maz
lou
m
i
,
and
H
adi
Zam
ani
Sabzi
,
“
Bo
rde
r
ga
te
wa
y
pr
otoc
ol
anoma
l
y
det
e
ct
ion
using
neur
al ne
twork
,
”
i
n
2019
IEEE
In
te
rnational
Conf
ere
nce on
B
ig
D
ata
(
Bi
g
Data)
,
2020,
pp.
6092
-
6094
,
doi
:
10
.
11
09/Bi
gData
4709
0.
2019.
9006201
.
[51]
Eff
y
R
aja
Naru
,
Hem
raj
Saini
,
a
nd
Mukesh
Sharm
a
,
“
A
rec
ent
r
evi
ew
on
li
ghtw
ei
ght
cr
y
ptogr
ap
h
y
in
IoT
,
”
in
2017
Inte
rnatio
nal
Confe
renc
e
on
I
-
SMAC
(
Io
T
in
Soci
al,
Mobi
le
,
Analyt
ic
s
and
Cloud)
(
I
-
SMAC)
,
2017,
doi:
10.
1109/I
-
SM
AC.2017.
8058307
.
[52]
S.
Deb
,
and
M.
M.
Haque
,
“
El
li
pti
c
cur
v
e
and
pseudo
-
inve
rse
m
at
rix
base
d
cr
y
ptos
y
stem
for
wire
le
ss
sensor
net
works
,
”
Inte
r
nati
onal
Journal
of
El
e
ct
ri
cal
an
d
Computer
Eng
ine
ering
(
IJE
CE
)
,
vol.
9
,
no
.
5
,
p.
4479
,
201
9
,
doi:
10
.
11591/ij
ec
e
.
v9i5
.
pp4479
-
4492.
[53]
B.
K.
Sidd
art
h
a
,
and
G.
K
.
Ra
vikumar,
“
An
e
ffic
i
ent
d
ata
m
a
sking
for
sec
ur
i
ng
m
edi
cal
d
at
a
using
DN
A
enc
oding
and
ch
aot
i
c
s
y
s
te
m
,
”
I
nte
rnational
Jou
rnal
of
El
e
ct
ri
ca
l
and
Comput
er
Engi
ne
ering
(
IJ
ECE
)
,
vol
.
10
,
no.
6
,
pp
.
6008
-
6018,
2020
,
doi
: 10.11591/
i
je
c
e.
v
10i6.
pp6008
-
60
18.
[54]
P.
Aparna
,
and
P
.
V.
V.
Kishore,
“
An
eff
ic
ie
nt
m
e
dic
a
l
image
wat
e
rm
ark
ing
te
chn
i
que
in
e
-
he
althc
are
app
li
c
at
ion
using
h
y
bridization
of
compress
ion
and
cr
y
p
togr
aph
y
a
lgori
th
m,
”
J.
Intell.
Syst
.
,
vol.
27,
no.
1,
Jan.
2018,
doi
:
10.
1515
/j
is
y
s
-
20
17
-
0266.
[55]
M.
El
hosen
y
,
K.
Shankar
,
S.
K.
La
kshm
ana
pra
b
u,
A.
Masel
eno,
and
N.
Arunku
m
ar,
“
H
y
brid
op
ti
m
iz
ation
wit
h
cr
y
p
togra
ph
y
en
cr
y
p
ti
on
for
m
ed
ic
a
l
image
sec
ur
i
t
y
in
In
te
rn
et
of Things,
”
Neural Com
put.
Appl.
,
v
ol.
32,
no
.
15,
pp.
10979
-
1099
3
,
Aug.
2020,
do
i:
10
.
1007/s0052
1
-
018
-
3801
-
x.
[56]
P.
T.
Akkasal
ig
ar
,
and
S.
Bir
ad
ar,
“
Sel
ec
t
ive
m
edi
c
al
image
en
cr
y
p
ti
on
using
DN
A
cr
y
ptogr
a
ph
y
,
”
In
formatio
n
Sec
urit
y
Journal
,
vol
.
29
,
no
.
2
,
p
p.
91
-
101
,
Mar
.
03,
2020
,
doi
:
10
.
1080/19393555.2020.1718248.
[57]
M.
A.
Sim
pli
cio,
M.
V.
M.
S
il
va
,
R.
C
.
A.
Alves,
and
T.
K.
C.
Shibata,
“
Li
ghtwei
ght
an
d
esc
row
-
le
ss
aut
hen
ti
c
at
ed
ke
y
agr
e
ement
for
the
int
ern
e
t
of
thi
ngs,
”
Comput.
Comm
un.
,
vol.
98,
no.
Ma
y
,
pp.
43
-
51,
2017,
doi:
10
.
1016/j.c
o
m
com.2016.
05.
0
02.
[58]
M.
Us
m
an,
I.
Ahm
ed,
M.
Im
ran
,
S.
Khan
,
an
d
U.
Ali,
“
SIT:
A
li
ghtwei
gh
t
enc
r
y
pt
ion
a
lgor
it
hm
for
sec
ure
int
ern
et
of
th
ings
,
”
Int
.
J
.
Adv
.
Comput.
Sc
i.
Appl.
,
vol.
8
,
no.
1,
pp.
1
-
1
0,
2017,
do
i
:
10.
14569/ijac
sa
.
2017.
080151.
Evaluation Warning : The document was created with Spire.PDF for Python.