Results 11 to 20 of about 5,570 (256)
New Differential-Based Distinguishers for Ascon via Constraint Programming [PDF]
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self-evaluation and third-party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several ...
Chan Song, Wenling Wu, Lei Zhang
doaj +4 more sources
SoK: Security of the Ascon Modes
The Ascon authenticated encryption scheme and hash function of Dobraunig et al. (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition. The mode underlying Ascon authenticated encryption (Ascon-AE)
Charlotte Lefevre, Bart Mennink
doaj +4 more sources
Ascon v1.2: Lightweight Authenticated Encryption and Hashing [PDF]
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig +3 more
semanticscholar +4 more sources
Exploring Differential-Based Distinguishers and Forgeries for ASCON
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with ...
David Gerault +2 more
doaj +3 more sources
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua +2 more
doaj +2 more sources
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher +2 more
doaj +3 more sources
Airborne Levels of Lung Carcinogens at an Ascon Manufacturing Site [PDF]
We assessed the airborne concentrations of the dust (both total and respirable), quartz, polycyclic aromatic hydrocarbons, and elemental carbon in an ascon manufacturing environment to determine the exposure to operators and the likelihood of developing ...
Kyeongmin Lee +4 more
doaj +2 more sources
Preimage and collision attacks on reduced Ascon using algebraic strategies
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of the NIST Lightweight Cryptography Project. In this paper, we propose an improved preimage attack against 2-round Ascon-XOF-64 with a complexity of $$2^{33}$
Qinggan Fu +3 more
doaj +2 more sources
Conditional Cube Attack on Round-Reduced ASCON
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al.
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
doaj +4 more sources
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings
The best-known distinguisher on 7-round Ascon-128 and Ascon-128a AEAD uses a 60-dimensional cube where the nonce bits are set to be equal in the third and fourth rows of the Ascon state during initialization (Rohit et al. ToSC 2021/1).
Kai Hu
doaj +3 more sources

