Results 11 to 20 of about 5,570 (256)

New Differential-Based Distinguishers for Ascon via Constraint Programming [PDF]

open access: goldIET Information Security
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self-evaluation and third-party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several ...
Chan Song, Wenling Wu, Lei Zhang
doaj   +4 more sources

SoK: Security of the Ascon Modes

open access: yesIACR Transactions on Symmetric Cryptology
The Ascon authenticated encryption scheme and hash function of Dobraunig et al. (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition. The mode underlying Ascon authenticated encryption (Ascon-AE)
Charlotte Lefevre, Bart Mennink
doaj   +4 more sources

Ascon v1.2: Lightweight Authenticated Encryption and Hashing [PDF]

open access: yesJournal of Cryptology, 2021
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig   +3 more
semanticscholar   +4 more sources

Exploring Differential-Based Distinguishers and Forgeries for ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with ...
David Gerault   +2 more
doaj   +3 more sources

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +2 more sources

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis

open access: diamondIACR Transactions on Symmetric Cryptology, 2022
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher   +2 more
doaj   +3 more sources

Airborne Levels of Lung Carcinogens at an Ascon Manufacturing Site [PDF]

open access: goldAerosol and Air Quality Research, 2020
We assessed the airborne concentrations of the dust (both total and respirable), quartz, polycyclic aromatic hydrocarbons, and elemental carbon in an ascon manufacturing environment to determine the exposure to operators and the likelihood of developing ...
Kyeongmin Lee   +4 more
doaj   +2 more sources

Preimage and collision attacks on reduced Ascon using algebraic strategies

open access: yesCybersecurity
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of the NIST Lightweight Cryptography Project. In this paper, we propose an improved preimage attack against 2-round Ascon-XOF-64 with a complexity of $$2^{33}$
Qinggan Fu   +3 more
doaj   +2 more sources

Conditional Cube Attack on Round-Reduced ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al.
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
doaj   +4 more sources

Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings

open access: diamondIACR Transactions on Symmetric Cryptology
The best-known distinguisher on 7-round Ascon-128 and Ascon-128a AEAD uses a 60-dimensional cube where the nonce bits are set to be equal in the third and fourth rows of the Ascon state during initialization (Rohit et al. ToSC 2021/1).
Kai Hu
doaj   +3 more sources

Home - About - Disclaimer - Privacy