2018 International Conference on Field-Programmable Technology (FPT) 2018
DOI: 10.1109/fpt.2018.00066
|View full text |Cite
|
Sign up to set email alerts
|

Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…ACORN is constructed based on stream cipher that processes bit-by-bit; however, it processes 32 steps in parallel, which makes it faster in hardware and software platforms [130]. The encryption and authentication shares 293 bits state encrypted via 128 bits key, 128 bits nonce to generate a 128 bits tag.…”
Section: Stream Cipher-based Lightweight Authenticated Encryption (Scae)mentioning
confidence: 99%
“…ACORN is constructed based on stream cipher that processes bit-by-bit; however, it processes 32 steps in parallel, which makes it faster in hardware and software platforms [130]. The encryption and authentication shares 293 bits state encrypted via 128 bits key, 128 bits nonce to generate a 128 bits tag.…”
Section: Stream Cipher-based Lightweight Authenticated Encryption (Scae)mentioning
confidence: 99%
“…Implementing one permutation round in one clock cycle requires 2.06k LUTs in a Spartan-6 device. Similarly, Ascon, by implementing one permutation per clock cycle, consumes 1.64k LUTs [23]. A bit-sliced technique has been used for the S-box implementation, and implementations have been done in the Spartan-6.…”
Section: Related Workmentioning
confidence: 99%
“…Since these implementations are similar (both are based on one round per clock cycle), Gimli outperforms because of its inherent structure. A lighter version (bit-sliced S-box) was implemented [23]. Although that design can reduce some hardware resources, TP and TP/A are 70% less, compared to the Gimli implementation.…”
Section: Comparisonmentioning
confidence: 99%
“…This meant the authenticated ciphers had to exhibit improved performance on resource-constrained devices while being able to exhibit resistance to side channel attacks. This kind of attack is often used to target cryptographic implementations on resource-constrained IoT devices deployed in remote locations with little to no physical protection [21]. Thus, in addition to being efficient, authenticated ciphers are also expected to be resistant to such attacks.…”
Section: Acornmentioning
confidence: 99%