Please use this identifier to cite or link to this item: http://dx.doi.org/10.25673/121719
Title: MicroCrypt : High-Efficiency Hashing for Next-Generation IoT Devices
Author(s): Al-Khalisy, Shatha H. Jafer
Granting Institution: Hochschule Anhalt
Issue Date: 2025
Extent: 1 Online-Ressource (9 Seiten)
Language: English
Abstract: The Internet of Things (IoT) is growing quickly and connecting more devices than ever before. This has made it more important to improve security protocols, especially cryptographic hash functions that work in places with limited computing, storage, and energy resources. This paper presents MicroCrypt, an innovative hash function developed specifically to address the unique requirements of IoT applications. While prior lightweight hash functions like SHA-256, BLAKE2s, and PHOTON have made strides, they exhibit limitations in quantum resilience, energy efficiency, and side-channel resistance. This work addresses these critical gaps by introducing MicroCrypt, a novel design optimised for the constrained and evolving demands of IoT devices. It outperforms traditional hash functions such as SHA-256, BLAKE2s, SHA-3, and MD5 in several key performance metrics, including processing speed, memory efficiency, and energy consumption. Our comprehensive comparative analysis indicates that MicroCrypt reduces processing time by about 40%, decreases memory usage by nearly 30%, and cuts energy consumption by approximately 35% when compared with the most efficient of these conventional functions. Additionally, MicroCrypt enhances security features, offering robust resistance against a variety of cryptographic attacks, which ensures exceptional data confidentiality and integrity. These improvements make MicroCrypt an excellent prospect for ongoing research and potential standardisation in post-quantum cryptography within IoT environments. The findings of this study underline MicroCrypt's significance as a groundbreaking advancement in cryptographic technology, specifically tailored to meet the evolving demands of next-generation IoT devices. This aligns with the critical need for secure, efficient, and scalable security solutions in the increasingly complex IoT landscape.
URI: https://opendata.uni-halle.de//handle/1981185920/123670
http://dx.doi.org/10.25673/121719
Open Access: Open access publication
License: (CC BY-SA 4.0) Creative Commons Attribution ShareAlike 4.0(CC BY-SA 4.0) Creative Commons Attribution ShareAlike 4.0
Appears in Collections:International Conference on Applied Innovations in IT (ICAIIT)

Files in This Item:
File Description SizeFormat 
1-6-ICAIIT_2025_13(4).pdf667.45 kBAdobe PDFThumbnail
View/Open