Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. Ascon (cipher) - Wikipedia
Ascon (cipher) - Wikipedia
From Wikipedia, the free encyclopedia
Family of authenticated ciphers
For other uses, see Ascon.
Ascon
General
DesignersC. Dobraunig, M. Eichlseder, F. Mendel, M. Schläffer[1]
First published2014
Cipher detail
Key sizesup to 128, 128 bits are recommended
Block sizesup to 128 bits, 128 and 64 bits are recommended
Structuresponge construction
Rounds6–8 rounds per input word recommended

Ascon is a family of lightweight authenticated ciphers and hash functions that have been selected by the U.S. National Institute of Standards and Technology (NIST) for cryptography on resource-constrained devices in 2025, specified in NIST SP 800-232.[2][3][4]

History

[edit]

Ascon was developed in 2014 by a team of researchers from Graz University of Technology, Infineon Technologies, Lamarr Security Research, and Radboud University.[5] The cipher family was chosen as a finalist of the CAESAR Competition[5] in February 2019.

NIST announced its decision on February 7, 2023[5] with the following steps that lead to its standardization:[2]

  • Publication of NIST IR 8454[6] describing the process of evaluation and selection that was used;
  • Preparation of a new draft[7] for public comments[8];
  • Public workshop held on June 21–22, 2023.[1]

NIST finalized the standard on August 13, 2025, releasing it as "Ascon-Based Lightweight Cryptography Standards for Constrained Devices" (NIST Special Publication 800-232).[9]

Design

[edit]

The design is based on a sponge construction along the lines of SpongeWrap and MonkeyDuplex. This design makes it easy to reuse Ascon in multiple ways (as a cipher, hash, or a MAC).[10] As of February 2023, the Ascon suite contained seven ciphers,[5] including:[11]

  • Ascon-128 and Ascon-128a authenticated ciphers;
  • Ascon-Hash cryptographic hash;
  • Ascon-Xof extendable-output function;
  • Ascon-80pq cipher with an "increased" 160-bit key.

The main components have been borrowed from other designs:[10]

  • substitution layer utilizes a modified S-box from the χ function of Keccak;
  • permutation layer functions are similar to the Σ {\displaystyle \Sigma } {\displaystyle \Sigma } of SHA-2.

Parameterization

[edit]

The ciphers are parameterizable by the key length k (up to 128 bits), "rate" (block size) r, and two numbers of rounds a, b. All algorithms support authenticated encryption with plaintext P and additional authenticated data A (that remains unencrypted). The encryption input also includes a public nonce N, the output - authentication tag T, size of the ciphertext C is the same as that of P. The decryption uses N, A, C, and T as inputs and produces either P or signals verification failure if the message has been altered. Nonce and tag have the same size as the key K (k bits).[12]

In the CAESAR submission, two sets of parameters were recommended:[12]

Suggested parameters, bits
Name k r a b
Ascon-128 128 64 12 6
Ascon-128a 128 128 12 8

Padding

[edit]

The data in both A and P is padded with a single bit with the value of 1 and a number of zeros to the nearest multiple of r bits. As an exception, if A is an empty string, there is no padding at all.[13]

State

[edit]

The state consists of 320 bits, so the capacity c = 320 − r {\displaystyle c=320-r} {\displaystyle c=320-r}.[14] The state is initialized by an initialization vector IV (constant for each cipher type, e.g., hex 80400c0600000000 for Ascon-128) concatenated with K and N.[15]

Transformation

[edit]

The initial state is transformed by applying a times the transformation function p ( p a {\displaystyle p^{a}} {\displaystyle p^{a}}). On encryption, each word of A || P is XORed into the state and the p is applied b times ( p b {\displaystyle p^{b}} {\displaystyle p^{b}}). The ciphertext C is contained in the first r bits of the result of the XOR. Decryption is near-identical to encryption.[14] The final stage that produces the tag T consists of another application of p a {\displaystyle p^{a}} {\displaystyle p^{a}}; the special values are XORed into the last c bits after the initialization, the end of A, and before the finalization.[13]

Transformation p consists of three layers:

  • p C {\displaystyle p_{C}} {\displaystyle p_{C}}, XORing the round constants;
  • p S {\displaystyle p_{S}} {\displaystyle p_{S}}, application of 5-bit S-boxes;
  • p L {\displaystyle p_{L}} {\displaystyle p_{L}}, application of linear diffusion.

Test vectors

[edit]

Hash values of an empty string (i.e., a zero-length input text) for both the XOF and non-XOF variants.[16]

Ascon-Hash("")
0x 7346bc14f036e87ae03d0997913088f5f68411434b3cf8b54fa796a80d251f91
Ascon-HashA("")
0x aecd027026d0675f9de7a8ad8ccf512db64b1edcf0b20c388a0c7cc617aaa2c4
Ascon-Xof("", 32)
0x 5d4cbde6350ea4c174bd65b5b332f8408f99740b81aa02735eaefbcf0ba0339e
Ascon-XofA("", 32)
0x 7c10dffd6bb03be262d72fbe1b0f530013c6c4eadaabde278d6f29d579e3908d

Even a small change in the message will (with overwhelming probability) result in a different hash, due to the avalanche effect.

Ascon-Hash("The quick brown fox jumps over the lazy dog")
0x 3375fb43372c49cbd48ac5bb6774e7cf5702f537b2cf854628edae1bd280059e
Ascon-Hash("The quick brown fox jumps over the lazy dog.")
0x c9744340ed476ac235dd979d12f5010a7523146ee90b57ccc4faeb864efcd048

See also

[edit]
  • CAESAR Competition
  • Simon and Speck, earlier lightweight cipher families released by the U.S. National Security Agency

References

[edit]
  1. ^ NIST (July 2021). "Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process". nist.gov. National Institute of Standards and Technology. p. 6.
  2. ^ a b NIST 2023a.
  3. ^ "NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices". NIST. 2025-08-13.
  4. ^ Sönmez Turan, Meltem; McKay, Kerry; Chang, Donghoon; Kang, Jinkeon; Kelsey, John (2024-11-08). Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions (Report). National Institute of Standards and Technology.
  5. ^ a b c d NIST 2023b.
  6. ^ Computer Security Division, Information Technology Laboratory (2023-06-16). "NIST IR 8454: Status Report of Lightweight Cryptography Final Round | CSRC". CSRC | NIST. Retrieved 2025-08-13.
  7. ^ Computer Security Division, Information Technology Laboratory (2024-11-06). "NIST Invites Public Comments on SP 800-232 | CSRC". CSRC | NIST. Retrieved 2025-08-13.
  8. ^ "Compilation of Public Comments on SP 800" (PDF). Archived (PDF) from the original on 2025-04-03.
  9. ^ "Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions". National Institute of Standards and Technology. 2025-08-13. doi:10.6028/NIST.SP.800-232. Retrieved 2025-08-23.
  10. ^ a b Dobraunig et al. 2016, p. 17.
  11. ^ Dobraunig et al. 2021, pp. 4–5.
  12. ^ a b Dobraunig et al. 2016, p. 2.
  13. ^ a b Dobraunig et al. 2016, p. 4.
  14. ^ a b Dobraunig et al. 2016, p. 3.
  15. ^ Dobraunig et al. 2016, pp. 4–5.
  16. ^ "Ascon Hash Family". hashing.tools.

Sources

[edit]
  • NIST (SP 800-232), "Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions" , nist.gov, National Institute of Standards and Technology
  • NIST (2023a). "Lightweight Cryptography Standardization Process: NIST Selects Ascon". nist.gov. National Institute of Standards and Technology.
  • NIST (2023b). "NIST Selects 'Lightweight Cryptography' Algorithms to Protect Small Devices". nist.gov. National Institute of Standards and Technology.
  • Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin (2016). "Ascon v1.2: Submission to the CAESAR Competition" (PDF). nist.gov. National Institute of Standards and Technology.
  • Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin (22 June 2021). "Ascon v1.2: Lightweight Authenticated Encryption and Hashing". Journal of Cryptology. 34 (3) 33. doi:10.1007/s00145-021-09398-9. eISSN 1432-1378. hdl:2066/235128. ISSN 0933-2790. S2CID 253633576.

External links

[edit]
  • TU Graz. "Ascon: Publications". tugraz.at.
  • Ascon Demo in Excel Example implementation and demonstration in Excel (without macros) by Tim Wambach
  • v
  • t
  • e
Block ciphers (security summary)
Common
algorithms
  • AES
  • Blowfish
  • DES (internal mechanics, Triple DES)
  • Serpent
  • SM4
  • Twofish
Less common
algorithms
  • ARIA
  • Camellia
  • CAST-128
  • GOST
  • IDEA
  • LEA
  • RC5
  • RC6
  • SEED
  • Skipjack
  • TEA
  • XTEA
Other
algorithms
  • 3-Way
  • Adiantum
  • Akelarre
  • Anubis
  • Ascon
  • BaseKing
  • BassOmatic
  • BATON
  • BEAR and LION
  • CAST-256
  • Chiasmus
  • CIKS-1
  • CIPHERUNICORN-A
  • CIPHERUNICORN-E
  • CLEFIA
  • CMEA
  • Cobra
  • COCONUT98
  • Crab
  • Cryptomeria/C2
  • CRYPTON
  • CS-Cipher
  • DEAL
  • DES-X
  • DFC
  • E2
  • FEAL
  • FEA-M
  • FROG
  • G-DES
  • Grand Cru
  • Hasty Pudding cipher
  • Hierocrypt
  • ICE
  • IDEA NXT
  • Intel Cascade Cipher
  • Iraqi
  • Kalyna
  • KASUMI
  • KeeLoq
  • KHAZAD
  • Khufu and Khafre
  • KN-Cipher
  • Kuznyechik
  • Ladder-DES
  • LOKI (97, 89/91)
  • Lucifer
  • M6
  • M8
  • MacGuffin
  • Madryga
  • MAGENTA
  • MARS
  • Mercy
  • MESH
  • MISTY1
  • MMB
  • MULTI2
  • MultiSwap
  • New Data Seal
  • NewDES
  • Nimbus
  • NOEKEON
  • NUSH
  • PRESENT
  • Prince
  • Q
  • QARMA
  • RC2
  • REDOC
  • Red Pike
  • S-1
  • SAFER
  • SAVILLE
  • SC2000
  • SHACAL
  • SHARK
  • Simon
  • Speck
  • Spectr-H64
  • Square
  • SXAL/MBAL
  • Threefish
  • Treyfer
  • UES
  • xmx
  • XXTEA
  • Zodiac
Design
  • Feistel network
  • Key schedule
  • Lai–Massey scheme
  • Product cipher
  • S-box
  • P-box
  • SPN
  • Confusion and diffusion
  • Round
  • Avalanche effect
  • Block size
  • Key size
  • Key whitening (Whitening transformation)
Attack
(cryptanalysis)
  • Brute-force (EFF DES cracker)
  • MITM
    • Biclique attack
    • 3-subset MITM attack
  • Linear (Piling-up lemma)
  • Differential
    • Impossible
    • Truncated
    • Higher-order
  • Differential-linear
  • Distinguishing (Known-key)
  • Integral/Square
  • Boomerang
  • Mod n
  • Related-key
  • Slide
  • Rotational
  • Side-channel
    • Timing
    • Power-monitoring
    • Electromagnetic
    • Acoustic
    • Differential-fault
  • XSL
  • Interpolation
  • Partitioning
  • Rubber-hose
  • Black-bag
  • Davies
  • Rebound
  • Weak key
  • Tau
  • Chi-square
  • Time/memory/data tradeoff
Standardization
  • AES process
  • CRYPTREC
  • NESSIE
  • NSA Suite B
  • CNSA
Utilization
  • Initialization vector
  • Mode of operation
  • Padding
  • v
  • t
  • e
Cryptography
General
  • History of cryptography
  • Outline of cryptography
  • Classical cipher
  • Cryptographic protocol
    • Authentication protocol
  • Cryptographic primitive
  • Cryptanalysis
  • Cryptocurrency
  • Cryptosystem
  • Cryptographic nonce
  • Cryptovirology
  • Hash function
    • Cryptographic hash function
    • Key derivation function
    • Secure Hash Algorithms
  • Digital signature
  • Kleptography
  • Key (cryptography)
  • Key exchange
  • Key generator
  • Key schedule
  • Key stretching
  • Keygen
  • Machines
  • Ransomware
  • Random number generation
    • Cryptographically secure pseudorandom number generator (CSPRNG)
  • Pseudorandom noise (PRN)
  • Secure channel
  • Insecure channel
  • Subliminal channel
  • Encryption
  • Decryption
  • End-to-end encryption
  • Harvest now, decrypt later
  • Information-theoretic security
  • Plaintext
  • Codetext
  • Ciphertext
  • Shared secret
  • Trapdoor function
  • Trusted timestamping
  • Key-based routing
  • Onion routing
  • Garlic routing
  • Kademlia
  • Mix network
Mathematics
  • Cryptographic hash function
  • Block cipher
  • Stream cipher
  • Symmetric-key algorithm
  • Authenticated encryption
  • Public-key cryptography
  • Quantum key distribution
  • Quantum cryptography
  • Post-quantum cryptography
  • Message authentication code
  • Random numbers
  • Steganography
  • Category


Stub icon

This cryptography-related article is a stub. You can help Wikipedia by adding missing information.

  • v
  • t
  • e
Retrieved from "https://teknopedia.ac.id/w/index.php?title=Ascon_(cipher)&oldid=1307480216"
Categories:
  • Block ciphers
  • Authenticated-encryption schemes
  • Extendable-output functions
  • Cryptographic hash functions
  • Cryptography stubs
Hidden categories:
  • Articles with short description
  • Short description matches Wikidata
  • All stub articles

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id