{"id":"https://openalex.org/W4403094421","doi":"https://doi.org/10.1109/access.2024.3472014","title":"Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?","display_name":"Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4403094421","doi":"https://doi.org/10.1109/access.2024.3472014"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3472014","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3472014","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3472014","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078214803","display_name":"Jonathan Cook","orcid":"https://orcid.org/0000-0001-8113-1296"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Jonathan Cook","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041207254","display_name":"Sabih ur Rehman","orcid":"https://orcid.org/0000-0001-7717-2773"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sabih Ur Rehman","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065309356","display_name":"M. Arif Khan","orcid":"https://orcid.org/0000-0001-6112-8874"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"M. Arif Khan","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078214803"],"corresponding_institution_ids":["https://openalex.org/I153230381"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15121806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"147619","last_page":"147639"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.946399986743927,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9386000037193298,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7892290353775024},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6907919645309448},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6318851709365845},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.47476673126220703},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45173248648643494},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.4404560923576355},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.43723583221435547},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3714868426322937}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7892290353775024},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6907919645309448},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6318851709365845},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.47476673126220703},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45173248648643494},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.4404560923576355},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.43723583221435547},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3714868426322937}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2024.3472014","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3472014","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/a178447d-50ac-467c-addc-885ae46c65c8","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/a178447d-50ac-467c-addc-885ae46c65c8","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cook, J, Rehman, S U & Khan, M A 2024, 'Lightweight cryptanalysis of IoT encryption algorithms : Is quota sampling the answer?', IEEE Access, vol. 12, pp. 147619 - 147639. https://doi.org/10.1109/ACCESS.2024.3472014","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:f25b9492f0944811b1708018cebcf3e9","is_oa":true,"landing_page_url":"https://doaj.org/article/f25b9492f0944811b1708018cebcf3e9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 147619-147639 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3472014","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3472014","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W369300053","https://openalex.org/W1564219727","https://openalex.org/W1576495995","https://openalex.org/W1600223249","https://openalex.org/W1937380053","https://openalex.org/W1979802565","https://openalex.org/W2023415055","https://openalex.org/W2029572069","https://openalex.org/W2029685080","https://openalex.org/W2057212849","https://openalex.org/W2074886859","https://openalex.org/W2087928947","https://openalex.org/W2100197298","https://openalex.org/W2103641030","https://openalex.org/W2112379301","https://openalex.org/W2132022337","https://openalex.org/W2142883190","https://openalex.org/W2170892587","https://openalex.org/W2190847501","https://openalex.org/W2483613891","https://openalex.org/W2609054345","https://openalex.org/W2743072699","https://openalex.org/W2790107201","https://openalex.org/W2799395196","https://openalex.org/W2901118812","https://openalex.org/W2913535829","https://openalex.org/W3027138853","https://openalex.org/W3041177379","https://openalex.org/W3041410513","https://openalex.org/W3047428447","https://openalex.org/W3109697674","https://openalex.org/W3157999218","https://openalex.org/W4205550388","https://openalex.org/W4213314837","https://openalex.org/W4229954652","https://openalex.org/W4294892362","https://openalex.org/W4300128852","https://openalex.org/W4313647184","https://openalex.org/W4366331238","https://openalex.org/W4386120872","https://openalex.org/W4394805016","https://openalex.org/W4403210923","https://openalex.org/W6743671332"],"related_works":["https://openalex.org/W1848890262","https://openalex.org/W2026284256","https://openalex.org/W1536590213","https://openalex.org/W2128639502","https://openalex.org/W1846045953","https://openalex.org/W1507705751","https://openalex.org/W1837498086","https://openalex.org/W1601440354","https://openalex.org/W2786560893","https://openalex.org/W4385434343"],"abstract_inverted_index":{"Rapid":[0],"growth":[1],"in":[2],"the":[3,11,18,50,96,164,168,173,182],"number":[4],"of":[5,13,20,86,100,125,128,139,149,163,170,184],"small":[6],"sensor":[7],"devices":[8],"known":[9,57],"as":[10],"Internet":[12],"Things":[14],"(IoT)":[15],"has":[16,81],"seen":[17],"development":[19],"lightweight":[21,26,44,129],"encryption":[22,45,102,130],"algorithms.":[23,131],"Two":[24],"well-known":[25],"algorithms":[27,46,71,103],"are":[28,47],"SIMON":[29],"and":[30,175,193],"SIMECK":[31],"which":[32,55],"have":[33],"been":[34],"specifically":[35],"designed":[36,189],"for":[37,72,117,167,190],"use":[38],"on":[39,49,93],"resource-constrained":[40],"IoT":[41],"devices.":[42],"These":[43],"based":[48],"efficient":[51],"Feistel":[52],"block":[53],"structure":[54],"is":[56,66,196],"to":[58,61,68,151,179],"exhibit":[59],"vulnerabilities":[60],"differential":[62,87,126,185],"cryptanalysis.":[63,186],"Consequently,":[64],"it":[65],"necessary":[67],"test":[69],"these":[70,101],"resilience":[73],"against":[74],"such":[75],"attacks.":[76],"While":[77],"existing":[78,154],"state-of-the-art":[79,144],"research":[80,177],"demonstrated":[82],"novel":[83],"heuristic":[84],"methods":[85],"cryptanalysis":[88,105,127],"that":[89,142],"improve":[90],"time":[91,106,147],"efficiency":[92],"previous":[94],"techniques,":[95],"large":[97],"state":[98],"sizes":[99],"inhibit":[104],"efficiency.":[107],"In":[108],"this":[109,191],"paper,":[110],"we":[111,157],"introduce":[112],"Versatile":[113],"Investigative":[114],"Sampling":[115],"Technique":[116],"Advanced":[118],"Cryptanalysis":[119],"(VISTA-CRYPT)":[120],"-":[121],"a":[122,136,159],"time-efficient":[123],"enhancement":[124],"The":[132,187],"proposed":[133],"technique":[134],"introduces":[135],"simple":[137],"framework":[138],"quota":[140],"sampling":[141],"produces":[143],"results":[145],"with":[146],"reductions":[148],"up":[150],"76%":[152],"over":[153],"techniques.":[155],"Further,":[156],"present":[158],"preliminary":[160],"graph-based":[161],"analysis":[162],"output":[165],"differentials":[166],"identification":[169],"relationships":[171],"within":[172],"data":[174],"future":[176],"opportunities":[178],"further":[180],"enhance":[181],"performance":[183],"code":[188],"work":[192],"associated":[194],"datasets":[195],"available":[197],"at":[198],"<uri":[199],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[200],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/johncook1979/simon-cryptanalysis</uri>.":[201]},"counts_by_year":[],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
