Abstract. We present a detailed security analysis of the CAESAR can-didate Ascon. Amongst others, cube-like, differential and linear crypt-analysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds. Theoretical key-recovery attacks are possible for up to 6 rounds of initialization. More-over, we present a practical forgery attack for 3 rounds of the finalization, a theoretical forgery attack for 4 rounds finalization and zero-sum distin-guishers for the full 12-round Ascon permutation. Besides, we present the first results regarding linear cryptanalysis of Ascon, improve upon the results of the designers...
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being de...
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of t...
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023)....
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of t...
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds A...
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being de...
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of t...
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023)....
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of t...
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds A...
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being de...
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of t...
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023)....