Suggestion of Two Authenticated Encryption Algorithms: Lightweight Chach20-Photon and Blowfish-Sha512 to Secure IoT-Edge-Cloud Networks

Authors

  • Rajaa K. Hasoun Information System Management, College of Business Informatics, University of Information Technology and Communications, Baghdad, Iraq
  • Ayad Al-Adhami Department of Computer Science, University of Technology, Baghdad, Iraq
  • Sanaa A. Jabber Faculty of Administration and Economics, AL-Muthanna University, Al Sumaway, Iraq https://orcid.org/0000-0003-2524-5373
  • Soukaena H. Hashem Department of Computer Science, University of Technology, Baghdad, Iraq

DOI:

https://doi.org/10.24996/ijs.2026.67.4.39

Keywords:

AE, IoT/Edge, chach20-photon, blowfish-sha512, lightweight authenticated

Abstract

     Edge networks are decentralized networks that allocate computing resources at the network's periphery. It reduces the need for data centres and cloud computing by bringing processing power and data storage closer to devices. This architecture improves reaction times and performance, especially for latency-sensitive and data-intensive applications. Edge networks, like any technology, have drawbacks; security is one of these. Protecting the data traveling over IoT Edge-Cloud nodes is critical. Authenticated Encryption (AE) algorithms are the best solution to provide data secrecy, integrity, and authenticity for data over these multi-node networks. This study seeks to secure the connection among IoT devices, edge servers, and cloud data centres, for IoT/Edge network proposed, lightweight chach20-photon AE is recommended, where the recommendation for the Edge/cloud network is the proposed Blowfish-Sha512 AE. From experimental results and comparisons, ChaCha20-Photon provides (50 Mbps) throughput, (15 Mbps) MAC generation, (2 ms) latency, (100 µJ) energy consumption, and high security, as compared with strong ChaCha20-Poly1305, which is commonly used in high-performance and strong security protocols such as Transport Layer Security (TLS), Secure Shell (SSH), and secure messaging apps. Blowfish-SHA-512 provides (20mbps) throughput, (19mbps) MAC Generation, (5 ms) latency, (200 µJ) energy consumption, and high security in comparison with strong Advanced Encryption Standard- Galois/Counter Mode (AES-GCM(, which is extensively used in various security protocols, including Transport Layer Security (TLS), Internet Protocol Security (IPsec), and virtual private networks (VPNs).

Downloads

Published

2026-04-30

Issue

Section

Computer Science

How to Cite

[1]
R. K. . Hasoun, A. . Al-Adhami, S. A. . Jabber, and S. H. . Hashem, “Suggestion of Two Authenticated Encryption Algorithms: Lightweight Chach20-Photon and Blowfish-Sha512 to Secure IoT-Edge-Cloud Networks”, Iraqi Journal of Science, vol. 67, no. 4, pp. 2395–2413, Apr. 2026, doi: 10.24996/ijs.2026.67.4.39.

Similar Articles

1-10 of 702

You may also start an advanced similarity search for this article.