Cryptographic Techniques for IoT: A Survey of Symmetric, Asymmetric, and Post Quantum Algorithms

Authors

  • Bhupender Rawat Professor, College of Smart Computing COER University, Roorkee, India. Author
  • Mohan Vishal Gupta Associate Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India. Author
  • Amit Kumar Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India. Author
  • Ashish Bishnoi Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India. Author
  • Manish Joshi Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India. Author

DOI:

https://doi.org/10.70454/JRICST.2026.30202

Keywords:

Internet of Things, Lightweight Cryptography, Symmetric Encryption Algorithms, Asymmetric Cryptographic Techniques, Post-Quantum Cryptography

Abstract

In this paper, we investigated the most widely utilized group key management approaches, which enabled and best-effort perspective within a trusted domain, for the Internet of Things (IoT) devices. The protection of such data is extremely challenging, as a majority of IoT devices have limited computation capabilities, small memory size, and constrained battery life. Traditional security techniques are usually excessively resource-intensive in such scenarios. This review quantitatively discusses three types of cryptographic primitives that can be executed on IoT devices, Symmetric Cryptography, Asymmetric Cryptography, and Post-Quantum Cryptography.  Symmetric cryptographic algorithms are widely used in IoT, as they have the highest throughput among other cryptographic primitives and they are energy efficient, due to their applicability for fast and low-energy data protection on devices. Asymmetric Cryptography plays an important role in secure key exchange and device authentication, especially in large scale and distributed IoT networks. Strong security is needed, but at the same time, devices must be able to communicate even if they have never met. Post-Quantum Cryptography is a new research area that aims to protect systems against powerful quantum computers in the future that are potentially capable of breaking most of the existing algorithms. However, while post-quantum algorithms are more secure, they can also be more resource-intensive, posing a challenge for small IoT devices. This paper emphasizes the importance of selecting cryptographic schemes that can provide strong security in spite of the constrained capabilities of IoT devices.

Downloads

Download data is not yet available.

References

[1] D. A. F. Saraiva, V. R. Q. Leithardt, D. de Paula, A. S. Mendes, G. V. González, and P. Crocker, “PRISEC: Comparison of symmetric key algorithms for IoT devices,” Sensors, vol. 19, no. 19, p. 4312, 2019, doi: 10.3390/s19194312.

[2] G. Sittampalam and N. Ratnarajah, “Enhanced symmetric cryptography for IoT using novel random secret key approach,” in Proc. 2nd Int. Conf. Advancements in Computing (ICAC), Malabe, Sri Lanka, 2020, pp. 398–403, doi: 10.1109/ICAC51239.2020.9357316.

[3] S. Szymoniak and M. Kubanek, “Biometry-based verification system with symmetric key generation method for Internet of Things environments,” Sci. Rep., vol. 15, p. 5464, 2025, doi: 10.1038/s41598-025-89226-3.

[4] C. Silva, V. A. Cunha, J. P. Barraca, et al., “Analysis of the cryptographic algorithms in IoT communications,” Inf. Syst. Front., vol. 26, pp. 1243–1260, 2024, doi: 10.1007/s10796-023-10383-9.

[5] S. Kumar and C. S. Pillai, “An analysis of lightweight symmetric encryption algorithms for secure data transmission in IoT,” in Proc. Int. Conf. Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, 2024, pp. 1–4, doi: 10.1109/IACIS61494.2024.10721701.

[6] M. S. Henriques and N. K. Vernekar, “Using symmetric and asymmetric cryptography to secure communication between devices in IoT,” in Proc. Int. Conf. IoT and Application (ICIOT), Nagapattinam, India, 2017, pp. 1–4, doi: 10.1109/ICIOTA.2017.8073643.

[7] J. Furtak, “The cryptographic key distribution system for IoT systems in the MQTT environment,” Sensors, vol. 23, no. 11, p. 5102, 2023, doi: 10.3390/s23115102.

[8] J. L. López Delgado, J. A. Álvarez Bermejo, and J. A. López Ramos, “Homomorphic asymmetric encryption applied to the analysis of IoT communications,” Sensors, vol. 22, no. 20, p. 8022, 2022, doi: 10.3390/s22208022.

[9] S. A. Ansari and S. Ali, “A systematic review of lightweight cryptographic schemes for security and privacy in IoT,” Discov. Comput., vol. 28, p. 266, 2025, doi: 10.1007/s10791-025-09755-3.

[10] A. Sharma and S. Rani, “Post-quantum cryptography (PQC) for IoT–consumer electronics devices integrated with deep learning,” IEEE Trans. Consumer Electron., vol. 71, no. 2, pp. 4925–4933, May 2025, doi: 10.1109/TCE.2025.3569904.

[11] R. Asif, “Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms,” IoT, vol. 2, pp. 71–91, 2021, doi: 10.3390/iot2010005.

[12] K. Mansoor, M. Afzal, W. Iqbal, and Y. Abbas, “Securing the future: Exploring post-quantum cryptography for authentication and user privacy in IoT devices,” Cluster Comput., vol. 28, no. 2, Apr. 2025, doi: 10.1007/s10586-024-04799-4.

[13] M. M. Alam, A. Arora, A. Bhatt, S. Devliyal, and S. Aluvala, “Cryptographic algorithms for IoT devices: A quantum analysis,” in Proc. 3rd Int. Conf. Innovation in Technology (INOCON), Bangalore, India, 2024, pp. 1–7, doi: 10.1109/INOCON60754.2024.10511982.

[14] C.-L. Chen, K.-W. Zeng, W.-Y. Li, C.-F. Lee, L.-C. Liu, and Y.-Y. Deng, “Lightweight post-quantum cryptography: Applications and countermeasures in Internet of Things, blockchain, and E-learning,” Eng. Proc., vol. 103, p. 14, 2025, doi: 10.3390/engproc2025103014.

[15] P. Kaur and S. Aggarwal, “Cryptographic algorithms in IoT—A detailed analysis,” in Proc. 2nd Int. Conf. Computational Methods in Science and Technology (ICCMST), Mohali, India, 2021, pp. 45–50, doi: 10.1109/ICCMST54943.2021.00021.

[16] S. K. Mousavi, A. Ghaffari, S. Besharat, et al., “Security of Internet of Things based on cryptographic algorithms: A survey,” WirelessNetw., vol. 27, pp. 1515–1555, 2021, doi: 10.1007/s11276-020-02535-5.

[17] K. CherkaouiDekkaki, I. Tasic, and M.-D. Cano, “Exploring post-quantum cryptography: Review and directions for the transition process,” Technologies, vol. 12, p. 241, 2024, doi: 10.3390/technologies12120241.

[18] D.-T. Dam, T.-H. Tran, V.-P. Hoang, C.-K. Pham, and T.-T. Hoang, “A survey of post-quantum cryptography: Start of a new race,” Cryptography, vol. 7, no. 3, p. 40, 2023, doi: 10.3390/cryptography7030040.

[19] R. Bavdekar, E. J. Chopde, A. Agrawal, A. Bhatia, and K. Tiwari, “Post-quantum cryptography: A review of techniques, challenges and standardizations,” in Proc. Int. Conf. Information Networking (ICOIN), Bangkok, Thailand, 2023, pp. 146–151, doi: 10.1109/ICOIN56518.2023.10048976.

[20] H. Dudhat, K. Jodhani, J. Delvadiya, U. Gundaraniya, S. Padhiar, and R. Fachara, “A comparative analysis of symmetric and asymmetric cryptographic algorithms: Performance, security, and versatility,” in ICT Systems and Sustainability (ICT4SD 2024), Lect. Notes Netw. Syst., vol. 1160. Singapore: Springer, 2025, doi: 10.1007/978-981-97-8591-9_27.

Downloads

Published

2026-04-06

Issue

Section

Article

How to Cite

Rawat, B., Vishal Gupta, M., Kumar, A., Bishnoi, A., & Joshi, M. (2026). Cryptographic Techniques for IoT: A Survey of Symmetric, Asymmetric, and Post Quantum Algorithms. Journal of Recent Innovations in Computer Science and Technology, 3(2), 12-21. https://doi.org/10.70454/JRICST.2026.30202

Similar Articles

1-10 of 22

You may also start an advanced similarity search for this article.