Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications

The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to the presence of wireless communication systems. An increasing number of M2M applications, such as smart meters, healthcare monitoring, transportation and packaging, or asset tracking, make a signiﬁcant contribution to the growth of devices and connections. Within such a large and uncontrollable ecosystem, IoTposes several new problems. Security and privacy are among the most important of these problems. Lightweight cryptography can be used more eﬀectively for small size, low energy, and small footprint such as RFID tags, sensors, and contactless smart cards. Therefore, it can be used to ensure security and privacy in the IoTapplications. In this study, PRESENT, CLEFIA, PICCOLO, PRINCE, and LBLOCK lightweight cryptographic algorithms, which can be used to secure data in IoTapplications, were analyzed in a test environment. As a result of the tests, the energy consumption of the algorithms, current measurement, active mode working time, and active mode energy consumption were identiﬁed and based on this, some inferences have been made.


Introduction
ARPANET, which was originally created in 1969 based on the idea that only a few systems are connected, has become an immense separate world where billions of computers and systems come together. Internet speed, capacity, and traffic have increased exponentially and extend into the future. e mobile devices that almost everyone has in their pockets today have superior capabilities than the super computers 20 years ago. Now, human beings can make almost all devices smart thanks to microsensors and smart chips. Smart phones, cars, and heating systems have become easily controllable and programmable.
In the last decade, the IoT has begun to take place in our lives quietly and gradually thanks to the presence of wireless communication systems. On a global scale, the number of objects that can be described as devices and connections is growing faster than the human population. erefore, this situation accelerates the increase in the average number of devices and connections per household and per person. Every year, new devices in different forms with increasing talent and intelligence are introduced and adopted. An increasing number of M2M applications, such as smart meters, healthcare monitoring, transportation and packaging, or asset tracking, make a significant contribution to the growth of devices and connections.
In this context, various definitions used in the literature on the concept of IoT are given as follows: (i) It is the network of systems created by connecting devices, vehicles, and living things to each other or other systems [1] (ii) It is a system of devices that share information and network by connecting to each other thanks to various communication protocols [2] (iii) It is the application area where different technologies integrated with each other are used in social life [3] (iv) ese are systems where devices connected to the Internet share data over the Internet to meet the needs of people without the need for human intervention [4] (v) It is a system that enables critical and effective use of services such as critical infrastructure, education, health, security, and transportation related to a settlement by using information and communication technologies [5] (vi) It is a community and marketplace made up of smart devices that communicate with each other using various communication protocols, produce information, and exchange information with their surroundings thanks to the network they create [6] e concept of the IoT was first mentioned in a presentation prepared by Kevin Ashton in 1999 for the company Procter and Gamble. In fact, in his presentation, Ashton listed the benefits of the company with the use of RFID (Radio Frequency Identification) technology. However, Ashton may have led the concept of the IoT that attracts attention and many products in this direction by putting forward the idea of connecting all devices to each other. With the "ITU Internet report 2005: Internet of ings" report published by the International Telecommunication Union (ITU) in 2005, the IoT concept was officially announced [7]. en, in 2009, a report titled "Internet of ings-Action Plan for Europe" was published by the European Commission [8]. Similarly, in the European Union report published in 2013, it was emphasized that the findings of the public survey conducted in 2012 show that the IoT technologies will facilitate the lives of individuals in areas such as health, social life, transportation, environment, and energy [9]. According to the report published by Cisco in 2011, in 2003, 500 million devices were connected to the Internet and the number of devices per person was 0.08. In 2010, the number of devices increased to 12.5 billion and the number of devices per person increased to 1.84. By 2020, it is estimated that the world population will be 7.6 billion and the number of devices connected to the Internet will be 50 billion [10]. According to Cisco Annual Internet Report (2018-2023), it is estimated that approximately two-thirds of the world's population will have Internet access by 2023. In addition, by 2023, it is predicted that the number of devices to be connected to the network by obtaining an IP address will be more than three times the global population. us, the number of devices connected to the network in 2018 is expected to increase from 18.4 billion to 29.3 billion in 2023. Within such a large and uncontrollable ecosystem, IoT poses several new problems. ese problems that the new IT world has to deal with are listed and briefly explained as follows [11]. (i) Security issues: as people, businesses, and countries have increased loyalty to IoT, hackers and malicious people also have a desire to access and steal data. erefore, security is the biggest problem that IoT has to overcome. (ii) Privacy issues: most IoT apps collect and process information to make people's daily lives easier. Since most of this data can be described as personal data, privacy problems arise. Such questions require careful analysis and risk-reducing solutions, especially from a legal perspective. (iii) Interoperability and standards-related problems: although IoT applications work with the Internet TCP/IP infrastructure and server/client architecture, many nonstandard protocols have been developed to allow objects with low processing capacities to communicate better and to operate data transfers effectively. is diversity raises interoperability problems. (iv) Legal problems: legislation has recently been on the agenda for the solution of the problems experienced by the ownership of the data collected by IoT applications. e national level studies on this issue may be insufficient for global IoT practices. (v) Economic development problems: IoT applications and developed technologies significantly change the economy. It is thought that dark factories and unmanned transportation vehicles can cause serious development problems. ese technologies make it possible to decrease the workforce based on manpower, that is, to increase unemployment or open new business areas. It is argued that developed countries can overcome these problems partially, but developing or underdeveloped countries are expected to experience serious crises.

IoT and Security
Devices manufactured for IoT applications provide many advantages, as well as many disadvantages inherently. ese disadvantages and the wide ecosystem are of particular interest to attackers. Below are some of the reasons why these devices were chosen as targets by attackers: (i) Excessive number of devices: as mentioned at the beginning of the study, the number of devices used in the IoT area is quite above the number of laptops or desktop computers. e large surface area is interesting for attackers, because, from the point of view of the attacker, the more the devices there are, the more the entry points that can be captured. (ii) Resource use is limited: devices used in the IoT are manufactured only to use resources to the extent that they perform their tasks. erefore, it is not possible to apply various security measures such as firewall, antivirus software on computers to such devices. is situation predicts that these devices can be easily targeted by attackers. (iii) Producers' ability of preventing operability: companies producing devices within the scope of the IoT are primarily aimed at operating the system in a healthy way. ese manufacturers often try to create new products as security problems arise. First products are offered to the market with weak security measures due to the target of being the first and most used product in the market. (iv) Collection of personal information: IoT products, especially the ones for the end user, collect and save a great deal of personal information. For example, health practices, home automation systems can be counted in this category. Certainly, storing the private information of individuals in a system attracts the attention of the attackers and increases the attacks on this subject. (v) Software updates that are not delivered on time: manufacturers only release updates when there is a problem or when there is a high level of innovation. However, delays in situations where these updates cannot be applied to all systems, or not applied at all, and instead encouraging the consumer to buy new products create particular security problems. (vi) Manufacturer's back door release: manufacturer companies use various access methods, known as back doors, to interfere with the devices remotely. If this method is detected by attackers, all devices can remain vulnerable. (vii) Default usernames and passwords: most devices are launched with the default username and password provided at the factory during initial setup to connect to the admin interface. In this way, the devices used without changing the default settings can be easily captured. e devices used in the IoT are in cyber space, and the components that make up cyber space are not inherently safe. At the heart of the problem lies the lack of security in the TCP/IP communication protocol. e data in IP packets is readable with simple software that most people can use, which proves the insecurity of cyberspace. In the informatics world, security is the provision of three main principles in general. ese three principles are as follows [11]: (i) Confidentiality: only authorized users can see the information. (ii) Integrity: only authorized users can change the information. (iii) Availability: information is always available when authorized users request it.
e most important problem for data transfer systems is privacy. In the IT world, confidentiality means protecting data from anyone except those who have an access right. e most important and functional technical data is encrypted by using cryptographic algorithms to ensure confidentiality. According to the Unit42 report, 98% of the IoT device traffic is transmitted on the network unencrypted. In addition, 57% of these devices are vulnerable to medium or high severity attacks [12]. is means that personal or corporate data transmitted by IoT applications are insecure. erefore, data transmission must be encrypted.
Encryption algorithms are divided into two groups, symmetric and asymmetric algorithms. Symmetric algorithms use the same key (secret key) for encryption and decryption. Asymmetric encryption algorithms, on the other hand, use a public key for encryption, while using a secret key for decryption. Symmetric encryption algorithms work fast compared to asymmetric encryption algorithms. In these algorithms, plain text is encrypted using a secret key and transmitted to the other party. e encrypted text is decrypted again using the same secret key. Symmetric encryption algorithms can be examined in 2 categories: block ciphers and stream ciphers. Block ciphers cryptographic algorithms process open text in bit groups called fixedlength blocks. e encrypted text is revealed by encrypting the blocks with a key. In the deciphering process, the encrypted text is turned into plain text with the help of the same key. When the literature is analyzed, it is seen that block ciphers are used in IoT applications.

Lightweight Cryptographic Algorithms
Cryptographic algorithm solutions to be used in the IoT should be designed and implemented in accordance with the limited resources of the devices used in IoT applications.
is necessity has created a new encryption area under the name of lightweight cryptography, which can be used more effectively for small size, low energy, and small footprint such as RFID tags, sensors, and contactless smart cards. In the world of data transmission, AES [13] is generally used as it is a secure standard. Although AES is a safe standard, it is not suitable for hardware restricted devices. It is known that a new solution other than AES is needed especially for applications that need to work with low power. Because in the 16 years since the adoption of AES, many technological innovations have emerged. On the other hand, [14] state that 2000 GE area is reasonable for RFID and similar devices and also integrated circuits for this should be produced. However, AES implementations have a 2400 GE area in the best conditions [15]. e purpose of lightweight cryptography is to provide algorithms that provide information security by using limited resources such as space, power consumption, and energy consumption. Many lightweight algorithms have been produced to achieve this goal. e majority of algorithms developed are block encryption algorithms.
roughout the study, PRESENT [16], CLEFIA [17], PIC-COLO [18], PRINCE [19], and LBLOCK [20] lightweight Security and Communication Networks 3 cryptographic algorithms were analyzed. e reason for choosing these algorithms can be explained as follows. PRESENTand CLEFIA are standardized as lightweight block cipher algorithm with the document ISO/IEC 29192-2: 2012 [21] which specifies the requirements for lightweight cryptography. On the other hand, PICCOLO, PRINCE, and LBLOCK are still in use for IoT applications. Also, all of these algorithms are suitable for hardware applications.
General information for analyzed algorithms is given in Table 1 and in this section some detailed information is summarized about the structures of algorithms. e round structure of the PRESENT encryption algorithm is given in Figures 1 and 2. Each round consists of key addition, nonlinear S-Box layers, and linear bitwise permutation layers.
Round key (K i � k i 63 , . . . , k i 0 ) and round input bits (b 63 , . . . , b 0 ) are entered into the XOR operation as follows, with 1 ≤ i ≤ 32 in the key insertion phase. Here, 32. XOR process is used for final bleaching. In the nonlinear displacement process, the following S-box defined as 4-bit S: Linear bitwise permutation process was performed according to the following table. Accordingly, the bit in position i is transferred to position P(i).
As in [22][23][24][25], there are successful attacks to reducedround of PRESENT. However, there is no successful attack published in the literature for full-round PRESENT. [17] is an algorithm developed by Sony Corporation that encrypts 128-bit data blocks with 128-, 192-, and 256-bit key options. It has been standardized as a lightweight block cipher algorithm with ISO/IEC 29192-2: 2012 [21] document like PRESENT. e algorithm using the Feistel architecture encrypts at 18 rounds for 128-bit key length, while it is encrypting at 22 and 26 rounds for 192and 256-bit key lengths, respectively. Each round consists of 4 buses and two 32-bit F functions. CLEFIA round structure is given in Figure 3. In the encryption process, P, C ∈ 0, 1 { } 128 , with P plain text and C encrypted text.

CLEFIA. CLEFIA
In addition, 4 pieces in the form of P , are processed in the data paths to obtain C � C 0 |C 1 |C 2 |C 3 which is a C encrypted text. In the first and last round, WK 0 , WK 1 , WK 2 , WK 3 ∈ 0, 1 { } 32 is used for key whitening. Round keys from the key generation phase are specified as RK i ∈ � 0, 1 { } 32 (0 ≤ i < 2r), with r being the number of rounds. As a first step, P 1 and P 3 of the open text are taken to XOR with WK 0 and WK 1 . en, P 0 block is taken to the function F 0 with the key RK 0 and F 0 (RK 0 , P 0 ) being performed. e result is taken to the XOR transaction with the result of the P 1 ⊕WK 0 transaction. Likewise, the P 2 block is taken to the F 1 function with the RK 1 key and the result obtained by performing the F 1 (RK 1 , P 2 ) operation is taken to the XOR operation with the result of the P 3 ⊕WK 1 operation. By changing the P 0 block formed at the end of the round to 4 Security and Communication Networks ⟶ P 2 , the next round is passed. e P 1 and P 3 parts of the function outputs of the last round are taken to XOR with WK 2 and WK 3 . e designers of CLEFIA consider that any attack does not threaten full-round CLEFIA. ey analyzed against the differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis, and square attack. In [26][27][28][29][30][31], there are some successful attacks to reduced-round of CLEFIA. However, there is no successful attack published in the literature for full-round CLEFIA. [18] is an algorithm that encrypts 64-bit data blocks, optimized for devices with extremely limited capacity by Sony, such as CLEFIA, with 80-and 128bit key options. e designers of the algorithm are Kyoji Shibutani et al., Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, and Taizo Shirai. e algorithm using Feistel architecture encrypts at 25 rounds for 80-bit key length, while it is encrypting at 31 rounds for 128-bit key  After the 1st and 3rd parts whitening switch is put into XOR operation with wk 0 and wk 1 , the results are processed with the F function. e function output is subjected to XOR operation with the round switches rk 0 and rk 1 . Before the results are transferred to the next round, they are taken to the permutation process with the RP layer. e round structure of the PICCOLO encryption process is given in Figure 5. e F function defined as F: 0, 1 { } 16 ⟶ 0, 1 { } 16 used in the rounds in the PICCOLO algorithm is given in Figure 6.

PICCOLO. PICCOLO
Accordingly, the 16-bit input value passes primarily through the 4-bit S-boxes as follows: (1) e S-box used at this stage is as follows.   RP: en, the bits are combined and transferred to the other round. In the last round, permutation is not performed.
As in [32][33][34][35][36], there are some successful attacks to reduced-round of PICCOLO. However, there is no successful attack published in the literature for full-round PICCOLO. [19] is an algorithm that encrypts 64bit data blocks with a 128-bit key. Hardware optimized PRINCE was designed by Borghoff et al. presented in Asiacrypt 2012. e algorithm, which has a structure called FX, performs the encryption by using a different key. According to the designers' suggestion, the algorithm that encrypts in 12 steps divides the 128-bit k key into two 64-bit pieces as k � k 0 |k 1 . en, k 0 |k 0 ′ |k 1 conversion is performed so that 192 bits are expanded to k 0 ′ � (k 0 ⋙1) ⊕(k 0 ≫ 63).

PRINCE. PRINCE
Here, k 0 and k 0 ′ 'are used as whitening switches, while k 1 is used as a round switch for 12 steps. erefore, the algorithm does not have a detailed key generation phase and the same key is used in each round. e key whitening process is done by taking the k 0 value into the XOR operation with the open text m as in Figure 7 and the output value after 12 steps through the XOR operation with the k 0 ′ . e diagram of the PRINCE encryption algorithm is given in Figure 8. Each step contains XOR'ing with the round key k 1 , mapping with S-box, linear conversion process, and XOR'ing with the round constant RC i . After the first 5 rounds run, S-box, linear transformation, and reverse of S-box are performed as intermediate.
As in [37][38][39][40][41][42], there are some successful attacks to reduced-round of PRINCE. However, there is no successful attack published in the literature for full-round PRINCE. [20] is an algorithm that encrypts 64-bit data blocks proposed by Wu and Zhang with an 80-bit key. It is designed to be efficient and safe on equipment that works with limited resources. e algorithm that uses Feistel architecture completes the encryption process in 32 rounds. In encryption process, 64-bit M open text is divided into two 32-bit pieces as M � X 1 | X 0 . en, X 1 and K 1 round keys are taken to the F round function, and XOR operation is taken with the result of X 0 ⋘8, which cyclically shifted 8 bits to the left. e result is saved as the X 2 value of the next round. At the end of 32 rounds, M open text is encrypted as C � X 32 | X 33 .

LBLOCK. LBLOCK
e LBLOCK round structure is given in Figure 9.
e F round function, which takes place in the LBLOCK encryption algorithm, includes the steps of passing the input values to the XOR through the S-boxes and then applying the diffusion process. e expression of the F round function is as follows. e diagram is given in Figure 10: 8 different 4-bit S-boxes are used in the F round function. Accordingly, by XOR'ing with K i round key, 32bit X value is divided into 8 pieces of 4 bits in the form of X � X 7 |X 6 |X 5 |X 4 |X 3 |X 2 |X 1 |X 0 and s 7 , s 6 , s 5 , s 4 , s 3 , s 2 , s 1 , s 0 is passed through S-boxes and transferred to diffusion layer. e X value passing through the S-boxes in the F round function is taken to diffusion. e diffusion process for the LBLOCK algorithm is designed as a permutation of 8 values of 4 bits. Accordingly, the X 7 |X 6 |X 5 |X 4 |X 3 |X 2 |X 1 |X 0 entries coming to the diffusion stage are listed as X 6 |X 4 |X 7 |X 5 |X 2 |X 0 |X 3 |X 1 .

Test Environment and Results
In this study, MSP-EXP430FR5994 LaunchPad Development Kit [49] is selected from MSP430 family, which is the product of Texas Instruments (TI) firm used in the industry  has low power consumption and is very efficient thanks to its new technology Low-Energy Accelerator (LEA). It can process analog data in real time. It has built-in eZ-FET debugging feature. With the help of this feature, the performance of the encryption code can be tested and analyzed regardless of any device. Eclipse based Code Composer Studio (CCS) [50], which can be used in devices manufactured by TI, has been used as a development environment. All lightweight encryption algorithms were compiled with C code in CCS and transferred to MSP430FR5994 device. Energy, power, and current measurements of the algorithms were carried out through EnergyTrace software [51]. EnergyTrace technology is an energy-based code analysis tool that measures and displays the energy profile of the application and also helps optimize for ultra-low power consumption. It works integrated within Code Composer Studio. It has two modes, EnergyTrace and EnergyTrace++. Basic energy measurements can be made with the Energy-Trace mode. e supply voltage in the microcontroller is sampled continuously to measure energy and power. is mode can be used to verify the application's energy consumption without accessing the debugger. EnergyTrace++ mode provides basic energy measurements as well as information about the internal status of the microcontroller such as RAM usage and energy modes. MSP430FR5994 used in the test environment is given in Figure 11.
For a secure communication environment, the task of edge devices such as MSP430 can be summarized as encrypting the data they receive from the sensors, transmitting them to cloud, server or broker role devices, and deciphering and processing data from such devices. In other words, usually these devices only encrypt or decrypt data. For this reason, encryption and decryption are considered separately for each algorithm in the scenario used in the test environment. Since the energy consumption of data transmission differs according to communication technologies such as Bluetooth, Wi-Fi, Zigbee, Z-Wave, 6LoWPAN, Figure 9: LBLOCK encryption round structure.        and LoRaWAN, it is not considered in this scenario.
According to the scenario determined in the test environment, after running MSP430FR5994, it will switch to active mode (AM) in every second, it will perform the encryption or decryption process, and then it will go into the power saving mode LPM (Low Power Mode). e timing diagram of test scenario is shown in Figure 12. Energy, power, and current data of algorithms were measured with EnergyTrace software by operating the device for 10 seconds in this way. e energy consumption of the tested algorithms was determined by compiling the obtained results.
Considering the PRESENT algorithm, the encryption process worked on MSP430FR5994 for 10 seconds, consuming 9.523 mJ of energy. As seen in Figure 13, on average, it consumed 0.9548 mW and at most 1.6383 mW. An average of 0.2905 mA and a maximum of 0.4982 mA current were drawn. In this way, the device can work with 2 AA batteries for 9 months and 21 days. e decoding process consumed 9.573 mJ of energy according to the same scenario. As seen in Figure 14, on average, it consumed 0.9591 mW and at most 1.6374 mW. An average of 0.2918 mA current and the maximum of 0.4980 mA current were drawn. In this way, the device can operate for 9 months and 19 days.
MSP430FR5994 completed the PRESENT encryption process in active mode at 15.5% of the 10 seconds of its operating time and the rest in the LPM mode at 84.5%. is situation can be seen in Figure 15. e device spent only 23% of its total energy consumption when encrypting in active mode. Similar results were obtained in the deciphering process.
On the other hand, considering the prominent LBLOCK algorithm with the lowest results, it spent 5.812 mJ of energy working on the MSP430FR5994 encryption process for 10 seconds. As seen in Figure 16, on average, it consumed 0.5799 mW and the maximum 0.8295 mW. An average of 0.1764 mA and the maximum of 0.2522 mA current were drawn. In this way, the device can work with 2 AA batteries for 1 year and 3 months. e decoding process consumes 5.924 mJ of energy according to the same scenario. As seen in Figure 17, on average, it consumed an average of 0.5894 mW and a maximum of 0.8605 mW. An average of 0.1793 mA and the maximum of 0.2617 mA current were drawn. e device can operate in this way for 1 year and 3 months.
MSP430FR5994 completed 2.2% of LBLOCK encryption process in active mode and spent the remaining 97.8% in LPM mode. is situation can be seen in Figure 18. e device consumed only 3.9% of the total energy consumption while it is encrypting in active mode. Similar results were obtained in the deciphering process.
Energy measurements of the algorithms examined throughout the study are given in Table 2, power measurements are given in Table 3, current measurements are given in Table 4, estimated battery life is given in Table 5, and operating time and active mode rates according to the energy consumed are given in Table 6.

Conclusions
e role of energy consumption is emphasized in this study, which was conducted to guide future studies. Access to devices can be difficult, depending on the usage areas of IoT applications. For this reason, parameters such as energy consumption and battery life should be considered when preparing secure communication applications. As mentioned earlier, communication of IoT applications is mostly unsafe. e safest and cheapest method to ensure security is data encryption.
In this study, PRESENT, CLEFIA, PICCOLO, PRINCE, and LBLOCK lightweight cryptographic algorithms, which can be used to secure data in IoT applications, were analyzed in a test environment in terms of energy consumption. e test devices were chosen from the edge devices used in the industry.
PRESENT and CLAFIA algorithms are standardized as lightweight block cipher algorithm with ISO/IEC 29192-2: 2012 document. However, these algorithms emerged at the time when Internet applications of objects had just become widespread. As a result of the tests, the energy consumption of the algorithms, current measurement, active mode working time, and active mode energy consumption were identified. e results are listed in Tables 2-6.
Accordingly, LBLOCK, which encrypts the minimum energy 64-bit block length with an 80 bit key, is used by CLEFIA, which decrypts the 128-bit block length with a 256bit key. While the LBLOCK algorithm was first in power consumption, other algorithms gave similar values. LBLOCK takes first place in current measurement. Considering the active mode times of the device in encryption and decryption processes, PICCOLO and LBLOCK went ahead, while the PRINCE algorithm had quite bad results. Finally, when active mode energy ratios are examined, it is seen that PICCOLO and LBLOCK algorithms take the first place.
When the results obtained in the study are examined, it can be said that the number of loops and block size of the algorithms make a difference in terms of energy consumption, current measurement, active mode working time, and active mode energy consumption. CLEFIA is the encryption algorithm that has the largest block length among the algorithms examined with 128-bit block length, while, in other algorithms, 64-bit is preferred as block length. is is inherently important for devices operating in the Internet applications of low-capacity objects. It is more efficient to encrypt small size blocks. Also, those that give good results from the studied algorithms use Feistel architecture. On the other hand, increased key size decreases energy efficiency. Of course, the larger the key size is, the better the security is provided. However, in the IoTapplications, the keys between 80 bits and 128 bits can be considered ideal. Selecting the structures in the algorithms in a simple way that does not consume too much energy increases efficiency. Energy consuming structures such as reduction processes and mixed bumps used in CLEFIA and PICCOLO algorithms prove this situation. It can be concluded that the reason for the LBLOCK algorithm to come first in these measurements is due to simple operations such as XOR and S-boxes in its structure.
ere is no AES-like standard in the industry of IoT for lightweight algorithms. For this reason, it is possible to encounter new encryption algorithms for many new IoT in the near future. Secure data transmission is essential in the field of IoT. However, besides the security, an efficient application is also very important. erefore, parameters like energy consumption should also be considered for the design of lightweight cryptographic algorithms to be developed in the future.

Data Availability
Data are available upon request to the corresponding author.

Conflicts of Interest
e authors declare no conflicts of interest.