Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/12416
Title: 128-bit ASCON Security IP For Automotive Interfaces
Authors: Panavkar, Yash
Keywords: EC 2021
Project Report
Project Report 2022
EC Project Report
EC (VLSI)
VLSI
VLSI 2022
22MEC
22MECV
22MECV15
Issue Date: 1-Jun-2024
Publisher: Institute of Technology
Series/Report no.: 22MECV15;
Abstract: Security is an important consideration for the automotive sector. Nowadays, automation is widely employed in the hardware and software industries for a variety of reasons, including increased safety, enhanced efficiency and cost savings, increased production, and improved accuracy and quality. Although the AES method is extensively used in many applications, such as file encryption, processor security, wireless security, and so on, a new algorithm called ASCON has been created for lightweight cryptography. The Ascon authenticated encryption algorithm uses duplex modes with strong keyed initialization and finalization routines. The process consists of four stages: initialization, insertion of associated data, insertion of plaintext, and finalization. Initialization involves applying rounds of a round transformation to a 320-bit initial state formed by a secret key, nonce, and initialization vector. Associated data and plaintext are processed in blocks with specific XOR operations and permutations, ensuring secure encryption. The finalization stage includes XORing the secret key, and the resulting tag is derived from the final state and key. The verified decryption process mirrors encryption, generating plaintext only if the calculated tag matches the received tag. Ascon's security relies on two 320-bit permutations, Pa and Pb, incorporating round constants, S-boxes, and linear diffusion layers. The methodology emphasizes the efficiency of bit-sliced operations and lookup tables. In conclusion, Ascon provides a secure and efficient authenticated encryption scheme with key components like permutation processes, specific encryption stages, and tag verification during decryption.
URI: http://10.1.7.192:80/jspui/handle/123456789/12416
Appears in Collections:Dissertation, EC (VLSI)

Files in This Item:
File Description SizeFormat 
22MECV15.pdf22MECV154.19 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.