没有合适的资源?快使用搜索试试~ 我知道了~
NIST第2轮候选轻量级分组密码.pdf
需积分: 5 4 下载量 84 浏览量
2022-04-13
15:49:08
上传
评论
收藏 5.72MB PDF 举报
温馨提示
试读
92页
NIST第2轮候选轻量级分组密码.pdf
资源详情
资源评论
资源推荐
NISTIR 8369
Status Report on the Second Round of
the NIST Lightweight Cryptography
Standardization Process
Meltem S
¨
onmez Turan
Kerry McKay
Donghoon Chang
C¸ gdas ¸a
˘
¸ Calık
Lawrence Bassham
Jinkeon Kang
John Kelsey
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8369
NISTIR 8369
Status Report on the Second Round of
the NIST Lightweight Cryptography
Standardization Process
Meltem S
¨
onmez Turan
Kerry McKay
Donghoon Chang
C¸ gdas ¸a
˘
¸ Calık
Lawrence Bassham
Jinkeon Kang
John Kelsey
Computer Security Division
Information Technology Laboratory
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8369
July 2021
U.S. Department of Commerce
Gina M. Raimondo, Secretary
National Institute of Standards and Technology
James K. Olthoff, Performing the Non-Exclusive Functions and Duties of the Under Secretary of Commerce
for Standards and Technology & Director, National Institute of Standards and Technology
Certain commercial entities, equipment, or materials may be identified in this document in order to describe
an experimental procedure or concept adequately. Such identification is not intended to imply
recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to
imply that the entities, materials, or equipment are necessarily the best available for the purpose.
National Institute of Standards and Technology
Interagency or Internal Report 8369
Natl. Inst. Stand. Technol. Interag. Intern. Rep. 8369, 81 pages (July 2021)
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8369
NISTIR 8369 Second Round Status Report
Abstract
The National Institute of Standards and Technology (NIST) initiated a public standardiza-
tion process to select one or more Authenticated Encryption with Associated Data (AEAD)
and hashing schemes suitable for constrained environments. In February 2019, 57 candi-
dates were submitted to NIST for consideration. Among these, 56 were accepted as first-
round candidates in April 2019. After four months, NIST selected 32 of the candidates
for the second round. In March 2021, NIST announced 10 finalists to move forward to
the final round of the selection process. The finalists are ASCON, Elephant, GIFT-COFB,
Grain-128AEAD, ISAP, PHOTON-Beetle, Romulus, S
PARKLE, TinyJAMBU, and Xoodyak.
This report describes the evaluation criteria and selection process, which is based on public
feedback and internal review of the second-round candidates.
Keywords
authenticated encryption · cryptography · hash functions · lightweight cryptography
i
______________________________________________________________________________________________________
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8369
NISTIR 8369 Second Round Status Report
Acknowledgments
NIST thanks the second-round submission teams, who developed and designed the
second-round candidates, and the cryptographic community, who analyzed the candidates,
shared their comments through the lwc-forum, and published papers on various technical
aspects of the candidates.
NIST also thanks the developers, who provided optimized implementations of the can-
didates as well as the hardware and software benchmarking initiatives, for their contribution
to the understanding of the performance characteristics of the algorithms on various target
platforms.
Specifically, NIST thanks all those who contributed to the following projects: (i) FPGA
benchmarking by K. Mohajerani, R. Haeussler, R. Nagpal, F. Farahmand, A. Abdulgadir,
J.-P. Kaps, and K. Gaj; (ii) ASIC benchmarking by M. Aagaard and N. Zidari
ˇ
c; (iii) ASIC
benchmarking by M. Khairallah, T. Peyrin, and A. Chattopadhyay; (iv) Microcontroller
benchmarking by S. Renner, E. Pozzobon, and J. Mottok; (v) Microcontroller benchmark-
ing by R. Weatherley; (vi) RISC-V benchmarking by F. Campos, L. Jellema, M. Lemmen,
L. M
¨
uller, D. Sprenkels, and B. Viguier; (vii) RISC-V benchmarking by G. Nisanci, R.
Atay, M. K. Pehlivanoglu, E. B. Kavun, and T. Yalc¸ın; and (viii) eBACS (ECRYPT Bench-
marking of Cryptographic Systems) benchmarking by D. J. Bernstein and T. Lange.
The authors of this report acknowledge and appreciate contributions from their col-
leagues at NIST – Lily Chen, Andrew Regenscheid, Sara Kerman, Noah Waller, Isabel Van
Wyk, Ray Perlner, Lu
´
ıs Brand
˜
ao, Sheryl Taylor, Dustin Moody, and Michael J. Fagan –
who provided technical and administrative support and participated in meetings to discuss
the selection of the finalists.
ii
______________________________________________________________________________________________________
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8369
剩余91页未读,继续阅读
那些年磕过的糖
- 粉丝: 1
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0