Suit up! Made-to-Measure Hardware Implementations of ASCON

Hannes Groß, Erich Wenger, Christoph Erwin Dobraunig, Christoph Ehrenhöfer

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of the CAESAR authenticated encryption competition. In this paper, the promising CAESAR candidate ASCON is implemented in hardware and optimized for different typical applications to fully explore ASCON's design space. Thus, we are able to present hardware implementations of Ascon suitable for RFID tags, Wireless Sensor Nodes, Embedded Systems, and applications that need maximum performance. For instance, we show that an ASCON implementation with a single unrolled round transformation is only 7 kGE large, but can process up to 5.5 Gbit/sec of data (0.75 cycles/byte), which is already enough to encrypt a Gigabit Ethernet connection. Besides, ASCON is not only fast and small, it can also be easily protected against DPA attacks. A threshold implementation of ASCON just requires about 8 kGE of chip area, which is only 3.1 times larger than the unprotected low-area optimized implementation.
Original languageEnglish
Title of host publication18th Euromicro Conference on Digital Systems Design
Place of PublicationLos Alamitos
PublisherIEEE Computer Society
Pages645-652
DOIs
Publication statusPublished - 2015
Event18th Euromicro Conference on Digital Systems Design - Funchal, Madeira, Portugal
Duration: 26 Aug 201528 Aug 2015

Conference

Conference18th Euromicro Conference on Digital Systems Design
Country/TerritoryPortugal
CityFunchal, Madeira
Period26/08/1528/08/15

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Dive into the research topics of 'Suit up! Made-to-Measure Hardware Implementations of ASCON'. Together they form a unique fingerprint.
  • SeCoS - Secure Contactless Sphere - Smart RFID-Technologies for a Connected World

    Bösch, W., Wenger, E., Khan, H. N., Schmidt, J., Gadringer, M. E., Spreitzer, R. C., Mendel, F., Gruss, D., Hutter, M., Freidl, P. F., Görtschacher, L. J., Mangard, S. & Grosinger, J.

    1/01/1331/12/15

    Project: Research project

  • RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Project: Research area

  • VLSI Design

    Medwed, M., Wenger, E., Aigner, M. J., Posch, K., Hutter, M., Kirschbaum, M., Schmidt, J., Posch, R., Dominikus, S., Szekely, A., Feldhofer, M. & Plos, T.

    1/01/9515/07/19

    Project: Research area

Cite this