
The Library
Sycon : a new milestone in designing ASCON-like permutations
Tools
Mandal, Kalikinkar, Saha, Dhiman, Sarkar, Sumanta and Todo, Yosuke (2022) Sycon : a new milestone in designing ASCON-like permutations. Journal of Cryptographic Engineering, 12 . pp. 305-327. doi:10.1007/s13389-021-00272-9 ISSN 2190-8508.
|
PDF
WRAP-Sycon-new-milestone-designing-ASCON-like-permutations-Sarkar-2021.pdf - Published Version - Requires a PDF viewer. Download (1658Kb) | Preview |
Official URL: https://doi.org/10.1007/s13389-021-00272-9
Abstract
ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight applications in the CAESAR competition, which also has been submitted to NIST lightweight cryptography standardization. ASCON has been in the literature for a while; however, there has been no successful AEAD which is secure and at the same time lighter than ASCON. In this article, we have overcome the challenge of constructing a permutation that is lighter than the ASCON permutation while ensuring a similar performance, and based on which we achieve a more lightweight AEAD which we call Sycon. Extensive security analysis of Sycon confirms that it provides the same level of security as that of ASCON. Our hardware implementation result shows that the Sycon permutation has 5.35% reduced area, compared to the ASCON permutation. This leads to a remarkable area reduction for Sycon AEAD which is about 14.95% as compared to ASCON AEAD. We regard Sycon as a new milestone as it is the lightest among all the AEADs belonging to the ASCON family.
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software Z Bibliography. Library Science. Information Resources > Z004 Books. Writing. Paleography |
||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||
Library of Congress Subject Headings (LCSH): | Data encryption (Computer science) , Coding theory , Computer security, Cryptography, Computer networks -- Security measures -- Software, Ciphers | ||||||||
Journal or Publication Title: | Journal of Cryptographic Engineering | ||||||||
Publisher: | Springer | ||||||||
ISSN: | 2190-8508 | ||||||||
Official Date: | September 2022 | ||||||||
Dates: |
|
||||||||
Volume: | 12 | ||||||||
Page Range: | pp. 305-327 | ||||||||
DOI: | 10.1007/s13389-021-00272-9 | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Reuse Statement (publisher, data, author rights): | This is a post-peer-review, pre-copyedit version of an article published in Journal of Cryptographic Engineering. The final authenticated version is available online at: https://doi.org/10.1007/s13389-021-00272-9 | ||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||
Date of first compliant deposit: | 11 November 2021 | ||||||||
Date of first compliant Open Access: | 8 October 2022 |
Request changes or add full text files to a record
Repository staff actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year