10.25673/121719">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.41-49

MicroCrypt: High-Efficiency Hashing for Next-Generation IoT Devices


Shatha H. Jafer Al-Khalisy, Wafaa M. Salih Abed, Adil M. Salman, Ghada Emad Al-Kateb, Mohammed Aljanabi and Maad M. Mijwil


Abstract: The Internet of Things (IoT) is growing quickly and connecting more devices than ever before. This has made it more important to improve security protocols, especially cryptographic hash functions that work in places with limited computing, storage, and energy resources. This paper presents MicroCrypt, an innovative hash function developed specifically to address the unique requirements of IoT applications. This paper presents MicroCrypt, an innovative hash function developed specifically to address the unique requirements of IoT applications. While prior lightweight hash functions like SHA-256, BLAKE2s, and PHOTON have made strides, they exhibit limitations in quantum resilience, energy efficiency, and side-channel resistance. This work addresses these critical gaps by introducing MicroCrypt, a novel design optimised for the constrained and evolving demands of IoT devices. It outperforms traditional hash functions such as SHA-256, BLAKE2s, SHA-3, and MD5 in several key performance metrics, including processing speed, memory efficiency, and energy consumption. It outperforms traditional hash functions such as SHA-256, BLAKE2s, SHA-3, and MD5 in several key performance metrics, including processing speed, memory efficiency, and energy consumption. Our comprehensive comparative analysis indicates that MicroCrypt reduces processing time by about 40%, decreases memory usage by nearly 30%, and cuts energy consumption by approximately 35% when compared with the most efficient of these conventional functions. Additionally, MicroCrypt enhances security features, offering robust resistance against a variety of cryptographic attacks, which ensures exceptional data confidentiality and integrity. These improvements make MicroCrypt an excellent prospect for ongoing research and potential standardisation in post-quantum cryptography within IoT environments. The findings of this study underline MicroCrypt's significance as a groundbreaking advancement in cryptographic technology, specifically tailored to meet the evolving demands of next-generation IoT devices. This aligns with the critical need for secure, efficient, and scalable security solutions in the increasingly complex IoT landscape.

Keywords: Cryptographic, Hash Function, Quantum Resistance, Encryption, MicroCrypt.

DOI: 10.25673/121719

Download: PDF

References:

  1. M. Padmashree, J. Arunalatha, and K. Venugopal, “Ebasket ECC blended authentication and session key establishment technique for IoT,” Int. J. Innovative Technol. Exploring Eng., vol. 10, no. 11, pp. 20–28, 2021, doi: 10.35940/ijitee.k9461.09101121.
  2. S. Han, K. Xu, Z. Zhu, S. Guo, H. Liu, and Z. Li, “Hash-based signature for flexibility authentication of IoT devices,” Wuhan Univ. J. Natural Sci., vol. 27, no. 1, pp. 1–10, 2022, doi: 10.1051/wujns/2022271001.
  3. S. Hakeem, S. El-Kader, and H. Kim, “A key management protocol based on the hash chain key generation for securing LoRaWAN networks,” Sensors, vol. 21, no. 17, p. 5838, 2021, doi: 10.3390/s21175838.
  4. M. Al-Shatari, F. Hussin, A. Aziz, G. Witjaksono, and X. Tran, “FPGA-based lightweight hardware architecture of the PHOTON hash function for IoT edge devices,” IEEE Access, vol. 8, pp. 207610–207618, 2020, doi: 10.1109/ACCESS.2020.3038219.
  5. S. Kumari, M. Singh, R. Singh, and H. Tewari, “To secure the communication in powerful Internet of Things using innovative post-quantum cryptographic method,” Arab. J. Sci. Eng., vol. 47, no. 2, pp. 2419–2434, 2021, doi: 10.1007/s13369-021-06166-6.
  6. A. Esfahani, G. Mantas, R. Matischek, F. Saghezchi, J. Rodríguez, A. Bicaku, et al., “A lightweight authentication mechanism for M2M communications in industrial IoT environment,” IEEE Internet Things J., vol. 6, no. 1, pp. 288–296, 2019, doi: 10.1109/JIOT.2017.2737630.
  7. M. Ahmed, S. Lee, and Y. Peker, “Physical unclonable function and hashing are all you need to mutually authenticate IoT devices,” Sensors, vol. 20, no. 16, p. 4361, 2020, doi: 10.3390/s20164361.
  8. S. Windarta, K. Ramli, B. Pranggono, and T. Gunawan, “Lightweight cryptographic hash functions: design trends, comparative study, and future directions,” IEEE Access, vol. 10, pp. 82272–82294, 2022, doi: 10.1109/ACCESS.2022.3195572.
  9. H. Li et al., “Efficient and lightweight hash function for IoT devices,” IEEE Internet Things J., 2021, doi: 10.1109/JIOT.2021.3100467.
  10. Y. Wang et al., “Secure and lightweight hash-based authentication protocol for IoT devices,” Sensors, 2020, doi: 10.3390/s20164567.
  11. M. Aziz, A. Khan, J. Shuja, I. Khan, F. Khan, and A. Khan, “A lightweight and compromise-resilient authentication scheme for IoTs,” Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, 2019, doi: 10.1002/ett.3813.
  12. G. Al-Kateb, M. Aljanabi, and I. Khaleel, “CryptoGenSec: A hybrid generative AI algorithm for dynamic cryptographic cyber defence,” Mesopotamian J. CyberSecurity, vol. 4, no. 3, pp. 22–35, 2024.
  13. J. Kim et al., “Efficient hash function design for IoT devices with limited resources,” IEEE Trans. Ind. Informat., 2020, doi: 10.1109/TII.2020.2977321.
  14. A. S. Al-Azzawi, “Cognitive and adaptive cryptography: deep learning-driven secure communication framework,” Shifra J. Sci. Technol., vol. 2, no. 1, pp. 45–60, 2025.
  15. T. Wu et al., “A lightweight hash-based authentication scheme for IoT networks,” Future Gener. Comput. Syst., 2020, doi: 10.1016/j.future.2020.06.019.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.