TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Lightweight Cryptography

128 pointsby rdpintqogeogsaaover 3 years ago

6 comments

throw0101aover 3 years ago
The NSA developed some light-weight algorithms that were submitted to the ISO, but they were initially rejected due to lingering suspicions:<p>* <a href="https:&#x2F;&#x2F;techmonitor.ai&#x2F;techonology&#x2F;cybersecurity&#x2F;nsa-ciphers-iso" rel="nofollow">https:&#x2F;&#x2F;techmonitor.ai&#x2F;techonology&#x2F;cybersecurity&#x2F;nsa-ciphers...</a><p>* <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Simon_(cipher)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Simon_(cipher)</a><p>* <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Speck_(cipher)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Speck_(cipher)</a><p>The ISO went with PRESENT and CLEFIA for ISO&#x2F;IEC 29192 (&quot;Information technology - Security techniques - Lightweight cryptography&quot;):<p>* <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;PRESENT" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;PRESENT</a><p>* <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;CLEFIA" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;CLEFIA</a><p>A bit of a history of that episode:<p>* <a href="https:&#x2F;&#x2F;link.springer.com&#x2F;chapter&#x2F;10.1007&#x2F;978-3-030-10591-4_4" rel="nofollow">https:&#x2F;&#x2F;link.springer.com&#x2F;chapter&#x2F;10.1007&#x2F;978-3-030-10591-4_...</a><p>S&amp;S were eventually accepted for ISO 29167.
评论 #29139081 未加载
JoachimSover 3 years ago
One really good thing with the finalist algorithms is that they all provide authenticated encryption. For many IoT systems, authentication and integrity protection is way more important than condidentiality.<p>Many older lightweight algorithms (or AES) for that matter requires adding either an authentication mode, or another primitive (a hash function used in HMAC for example)<p>I believe that has led to a problematic proliferation of only having confidentiality protection in too many IoT systems deployed.<p>These candidates makes it easier for developers to add the security properties their system actually needs.
ur-whaleover 3 years ago
Can someone point to a resource describing why various candidates got rejected in round 1 and round 2?<p>Any comments on the decisions or was it just voting without explaining?
评论 #29140274 未加载
nemo1618over 3 years ago
One nice thing about lightweight crypto is that it&#x27;s easy to port. Implementing ASCON in Go was pretty fun and only took an hour or two: <a href="https:&#x2F;&#x2F;github.com&#x2F;lukechampine&#x2F;ascon&#x2F;blob&#x2F;master&#x2F;ascon.go" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;lukechampine&#x2F;ascon&#x2F;blob&#x2F;master&#x2F;ascon.go</a><p>(Obviously it wouldn&#x27;t make a ton of sense to use Go if you&#x27;re resource-constrained, but having a library is worthwhile for compatibility reasons regardless.)
marcosdumayover 3 years ago
Last time I checked, all the computers were growing powerful and crypto was relevant neither for latency nor for power consumption on any device capable of joining a network.<p>It helps that one of the largest factors on choosing crypto algorithms is speed on both general purpose and specialized hardware.<p>So, count me in the group of people that don&#x27;t understand why the NIST is doing this. Will they trade any security guarantee for speed? If so, nobody should ever use one of those algorithms. If not, whatever algorithm wins here would also win a new round of general purpose crypto contest.
评论 #29139687 未加载
评论 #29142671 未加载
评论 #29139627 未加载
评论 #29140183 未加载
评论 #29139942 未加载
28194608over 3 years ago
Who won the encryption against quantum computer?
评论 #29141383 未加载
评论 #29139760 未加载