Journal of International Commercial Law and Technology
2026, Volume 7, Issue 1 : 670-679
Original Article
Low-footprint, Energy-Efficient Memory Cryptographic Algorithm For Protecting Data in an Internet Of Things Setting
 ,
 ,
1
Research Scholar, RIMT University, Mandi Gobindgarh, Punjab, India
2
Professor and HOD , Department of Computer Applications, RIMT University, Mandi Gobindgarh, Punjab, India
3
Assistant Professor, Department of Computer Science, Gujranwala Guru Nanak Khalsa College, Ludhiana, India
Abstract

The rapid growth of Internet of Things (IoT) applications has intensified the demand for secure data communication under strict resource constraints such as limited memory, low computational power, and restricted energy availability. Conventional cryptographic algorithms are often unsuitable for IoT devices due to their high complexity and resource consumption. This work proposes an energy-efficient and low-footprint lightweight cryptographic algorithm specifically designed for IoT environments. The proposed scheme combines features of the LESED lightweight block cipher and the RC4 stream cipher to enhance security while maintaining simplicity. The algorithm operates on 64-bit plaintext with an 80-bit working key and a 7-bit constant, utilizing only three encryption rounds and simple logical operations such as XOR, XNOR, and bit shifting. Key scheduling is strengthened using an RC4-based mechanism to increase complexity and resistance against attacks. The algorithm is implemented in C and evaluated using the FELICS benchmarking framework on AVR architecture. Experimental results demonstrate that the proposed cipher achieves significantly lower execution time, reduced memory consumption, and minimal energy usage compared to several well-known lightweight cryptographic algorithms. Furthermore, security analysis shows strong confusion and diffusion properties, high key sensitivity, a large key space, and compliance with the Strict Avalanche Criterion. These results confirm that the proposed algorithm is well-suited for secure and efficient data protection in resource-constrained IoT devices.

Keywords
Recommended Articles
Original Article
An Analysis of Impact of the Government Schemes for Women Welfare to achieve Sustainable Development.
Published: 08/05/2026
Original Article
Beyond Borders: A Multi-Tiered Framework for Youth-to-Professional Startup Visa Pathways.
...
Published: 07/05/2026
Original Article
The extent of constitutional oversight in protecting human rights in Jordan.
Published: 07/05/2026
Original Article
Financial Literacy, Digital Trust, and FinTech Adoption: A Structural Perspective from Bengaluru's Banking Sector.
Published: 06/05/2026
Loading Image...
Volume 7, Issue 1
Citations
222 Views
149 Downloads
Share this article
© Copyright Journal of International Commercial Law and Technology