Performance Evaluation of Lightweight Cryptography Hybrid Algorithms for Data Security
DOI:
https://doi.org/10.22105/kmisj.v2i3.70Keywords:
Lightweight encryption, Simon cipher, Hybrid cryptography, Avalanche effect, Resource-efficient securityAbstract
With the rapid expansion of digital communication and data exchange, ensuring data security has become paramount. Traditional cryptographic methods often struggle with balancing security, efficiency, and lightweight implementation for resource-constrained environments. This research focuses on the performance analysis and development of a lightweight cryptographic algorithm for enhanced data security by implementing Simon, Speck, and ChaCha20 individually, as well as in hybrid combinations—Simon-ChaCha20 and Speck-ChaCha20. A key research gap addressed is the need for cryptographic solutions that offer high security while maintaining computational efficiency for diverse data types. The main objective is to evaluate these algorithms based on their avalanche effect, encryption, and decryption performance across different data types, including text, audio, video, and document files. The entire methodology involves implementing and testing the individual and hybrid algorithms, analyzing their avalanche scores for text data, and comparing encryption and decryption times for various file formats. Results of this work indicate that hybrid algorithms achieve a higher avalanche score, demonstrating enhanced security, while also being adaptable for multimedia data encryption. The study’s findings have significant implications for lightweight cryptographic applications in Internet of Things (IoT), embedded systems, and real-time secure communication, offering a robust and efficient encryption approach for modern cybersecurity challenges.
References
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2015). The SIMON and SPECK lightweight block ciphers. Proceedings of the 52nd annual design automation conference (pp. 1-6). Design Automation Conference (DAC). https://doi.org/10.1145/2744769.2747946
Bernstein, D. J. (2008). ChaCha, a variant of Salsa20. Workshop record of SASC (pp. 3-5). ECRYPT SASC Workshop Proceedings. https://cr.yp.to/chacha/chacha-20080120.pdf
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2018). Handbook of applied cryptography. CRC Press. file:///C:/Users/Admin/Downloads/10.1201_9780429466335_previewpdf.pdf
Stallings, W. (2011). Cryptography and networksecurity principles andpractice. Pearson. https://www.uoitc.edu.iq/images/documents/informatics-institute/Competitive_exam/Cryptography_and_Network_Security.pdf
SSrinath, S., & Nagaraja, G. S. (2026). Design and implementation of a hybrid light weighted cryptographic (HLWCA) algorithm for modern IoT network architectures. Sustainable computing: Informatics and systems, 101337. https://doi.org/10.1016/j.suscom.2026.101337
Hosseinzadeh, J., & Bafghi, A. G. (2017). Evaluation of lightweight block ciphers in hardware implementation: A comprehensive survey. https://doi.org/10.48550/arXiv.1706.03878
Nir, Y., & Langley, A. (2018). ChaCha20 and Poly1305 for IETF protocols. https://datatracker.ietf.org/doc/html/rfc8439?utm_source
Muhammed, R. K., Aziz, R. R., Hassan, A. A., Aladdin, A. M., Saydah, S. J., Rashid, T. A., & Hassan, B. A. (2024). Comparative analysis of aes, blowfish, twofish, Salsa20, and ChaCha20 for image encryption. https://doi.org/10.48550/arXiv.2407.16274
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2015). Simon and Speck: Block ciphers for the internet of things. Cryptology Eprint Archive. https://ia.cr/2015/585