Ascon v1.2: Lightweight Authenticated Encryption and Hashing
نویسندگان
چکیده
Abstract Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide specification of Ascon -128 -128a. Both authenticated algorithms efficient on resource-constrained devices high-end CPUs. Furthermore, they have been selected as “primary choice” lightweight final portfolio CAESAR competition. addition, specify hash function Ascon-Hash , extendable output Ascon-Xof . Moreover, complement by providing a detailed overview existing cryptanalysis implementation results.
منابع مشابه
ALE: AES-Based Lightweight Authenticated Encryption
In this paper, we propose a new Authenticated Lightweight Encryption algorithm coined ALE. The basic operation of ALE is the AES round transformation and the AES-128 key schedule. ALE is an online single-pass authenticated encryption algorithm that supports optional associated data. Its security relies on using nonces. We provide an optimized low-area implementation of ALE in ASIC hardware and ...
متن کاملThe Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it’s predecessor Hummingbird-1, Hummingbird-2 has been targeted for low-end microcontrollers and for hardware implementation in lightweight devices such as RFID tags and wireless sensors. Compared to the p...
متن کاملJAMBU Lightweight Authenticated Encryption Mode and AES-JAMBU
In this paper, we propose a lightweight authenticated encryption mode JAMBU. It only needs n-bit extra register for a block cipher with 2n-bit block size. It achieves n-bit authentication security when 2 bits are processed under a single key. When nonce (IV) is reused, the encryption security is similar to that of the CFB mode while the message authentication maintains strong security. We insta...
متن کاملSingle-Path Authenticated-Encryption Scheme Based on Universal Hashing
An authenticated-encryption scheme is frequently used to provide a communication both with confidentiality and integrity. For stream ciphers, i.e., an encryption scheme using a cryptographic pseudorandom-number generator, this objective can be achieved by the simple combination of encryption and MAC generation. This naive approach, however, introduces the following drawbacks; the implementation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2021
ISSN: ['0933-2790', '1432-1378']
DOI: https://doi.org/10.1007/s00145-021-09398-9