Released in August 2025, this landmark publication represents the culmination of a rigorous multi-year standardization process that began with NIST’s Lightweight Cryptography Standardization initiative in 2015.NIST.SP.800-232.pdf
The Ascon family, originally developed by Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer, emerged victorious from NIST’s competitive evaluation process in February 2023.
The standardization addresses critical security needs for Internet of Things (IoT) devices, embedded systems, and low-power sensors where traditional cryptographic standards like AES-GCM and SHA-2 may prove too resource-intensive.NIST.SP.800-232.pdf
The standardized Ascon family encompasses four distinct but complementary algorithms, each serving specific cryptographic functions while sharing an underlying permutation-based architecture.
Ascon-AEAD128 provides authenticated encryption with associated data (AEAD) capabilities, offering 128-bit security strength in single-key settings with nonce-based protection.
This algorithm ensures both confidentiality of plaintext data and integrity verification through authentication tags.NIST.SP.800-232.pdf
The hash function component, Ascon-Hash256, produces 256-bit message digests with 128-bit security strength, providing collision, preimage, and second preimage resistance.
For applications requiring variable-length outputs, Ascon-XOF128 offers eXtendable Output Function capabilities with user-selectable output sizes up to 128-bit security strength.
Additionally, Ascon-CXOF128 enhances the XOF functionality by incorporating customization strings, enabling domain separation for applications requiring distinct outputs from identical inputs.NIST.SP.800-232.pdf
The Ascon algorithms distinguish themselves through several innovative design features that optimize performance for constrained environments.
All family members utilize shared permutation logic, enabling more compact implementations compared to independently developed functions.
The algorithms operate in an online, single-pass manner, meaning ciphertext blocks are generated incrementally without requiring complete input knowledge upfront.NIST.SP.800-232.pdf
Crucially, the standardized algorithms are inverse-free, eliminating the computational overhead of implementing reverse permutations.
The specification includes multiple implementation options, including tag truncation capabilities and nonce masking for enhanced security properties.
The standard also addresses multi-key settings, providing security strength formulas that account for the number of independent keys in use.NIST.SP.800-232.pdf
| Algorithm | Primary Function | Output Size | Security Strength | Key Features |
|---|---|---|---|---|
| Ascon-AEAD128 | Authenticated Encryption | Variable + 128-bit tag | 128 bits | Nonce-based, online processing |
| Ascon-Hash256 | Hash Function | 256 bits | 128 bits | Fixed-length digest |
| Ascon-XOF128 | Extendable Output | User-defined | Up to 128 bits | Variable-length output |
| Ascon-CXOF128 | Customized XOF | User-defined | Up to 128 bits | Domain separation support |
The publication establishes comprehensive security requirements, including key generation guidelines, nonce uniqueness requirements, and data processing limits.
For practical deployment, the standard specifies maximum data limits of 2^54 bytes per key and provides detailed guidance on decryption failure thresholds based on authentication tag lengths.NIST.SP.800-232.pdf
This standardization milestone provides industry stakeholders with formally approved cryptographic tools specifically optimized for the expanding ecosystem of resource-constrained devices, ensuring robust security without compromising performance in bandwidth-limited and power-sensitive applications.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post NIST Releases New ‘Lightweight Cryptography’ Standard for IoT Security appeared first on Cyber Security News.
Estefany Maria Rodríguez Florez, a reporter for the Spanish-language news outlet Nashville Noticias, was arrested…
President Donald Trump speaks to reporters during a news conference in Doral, Florida, on March…
Tennessee lawmakers are searching for recurring funding in the state's budget to fill deficits in…
More than half of the money sent to crisis pregnancy centers in Missouri comes from…
Meta’s Oversight Board wants the company to start taking AI labeling seriously to protect its…
Pokémon Pokopia players are speaking out to save others a whole lot of time and…
This website uses cookies.