Lightweight Cryptography for Resource Constrained Applications
Information Technology Laboratory, Computer Security Division
NIST only participates in the February and August reviews.
NIST standardized cryptographic algorithms are intended to be "bulletproof". That is, the computational complexity needed to break them is believed to be completely impractical on the conventional computers. The symmetric key based algorithms are also prepared for the future quantum computers where larger key size versions are included. But resource constrained devices such as RFID tags, sensors, and medical devices are widely used to transmit sensitive data through wireless interfaces, which need to be protected using cryptographic methods. The cryptography algorithms implemented in these devices require well-tailored design to suit the resource constrained environments. Many new designs have been proposed for such needs. On the other hand, the lightweight cryptography algorithms proposed in recent years tend to be broken very quickly. It indicates that it is not easy to "cut the corner" for the lightweight design. This research opportunity focuses on but is not limited to the following areas: (1) security analysis on the existing lightweight cryptography algorithms, (2) performance measurements for different algorithms on different platforms with well-defined resource limits, (3) lightweight protocol design for wireless applications; and (4) analysis on security and performance tradeoffs.