Dauriya Zhaxigulova

Work place: Department of Automation and Information Technologies, Shakarim University, Semey, Kazakhstan

E-mail: d.zhaksigulova@gmail.com

Website:

Research Interests: Cryptography

Biography

Dauriya Zhaxigulova: Master of Science and Technology, Ph.D. student of the East Kazakhstan Technical University named after D. Serikbayev (Ust-Kamenogorsk, Kazakhstan), teacher at the Department of Automation and Information Technologies, Shakarim University (Semey, Kazakhstan). Major research interests are Information Systems, Cryptography, Critical Information Infrastructure Protection, Mathematical Modelling of the Complex Technological Systems.

Author Articles
CLEFIA-based Lightweight Encryption for Resource-Constrained Systems: Design, Algorithms and Security Analysis

By Sergiy Gnatyuk Berik Akhmetov Dauriya Zhaxigulova Yuliia Polishchuk

DOI: https://doi.org/10.5815/ijcnis.2025.06.04, Pub. Date: 8 Dec. 2025

Emerging classes of distributed and embedded systems increasingly require cryptographic mechanisms that provide confidentiality, integrity, and authenticity while operating under strict limitations on computation, energy consumption, memory capacity, and communication bandwidth. Conventional symmetric and asymmetric cryptographic algorithms often fail to meet these stringent requirements. Lightweight cryptography (LWC) offers a promising solution by enabling secure real-time data transmission, command authentication, telemetry encryption, and protection of sensitive information in embedded systems. This paper presents a multicriteria analysis of widely adopted LWC algorithms, identifying the CLEFIA block cipher standardized in ISO/IEC 29192-2 as a balanced choice between security and performance. An enhanced LWC method based on the mentioned cipher is proposed, aiming to improve encryption throughput without compromising cryptographic robustness. Experimental results demonstrate that the proposed method achieves an encryption speedup over the baseline CLEFIA implementation. Furthermore, the improved algorithm successfully passes statistical randomness tests and shows increased resistance to linear and differential cryptanalysis. Notably, the cipher begins to exhibit random substitution characteristics from the third round, reinforcing its suitability for secure deployment in resource-limited environments. The results obtained in this study will be valuable for ensuring confidentiality, integrity, and authenticity in low-power and resource-constrained systems, as well as in modern information platforms where low latency is critical.

[...] Read more.
Other Articles