Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/12416
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Panavkar, Yash | - |
dc.date.accessioned | 2024-07-31T10:13:33Z | - |
dc.date.available | 2024-07-31T10:13:33Z | - |
dc.date.issued | 2024-06-01 | - |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/12416 | - |
dc.description.abstract | Security is an important consideration for the automotive sector. Nowadays, automation is widely employed in the hardware and software industries for a variety of reasons, including increased safety, enhanced efficiency and cost savings, increased production, and improved accuracy and quality. Although the AES method is extensively used in many applications, such as file encryption, processor security, wireless security, and so on, a new algorithm called ASCON has been created for lightweight cryptography. The Ascon authenticated encryption algorithm uses duplex modes with strong keyed initialization and finalization routines. The process consists of four stages: initialization, insertion of associated data, insertion of plaintext, and finalization. Initialization involves applying rounds of a round transformation to a 320-bit initial state formed by a secret key, nonce, and initialization vector. Associated data and plaintext are processed in blocks with specific XOR operations and permutations, ensuring secure encryption. The finalization stage includes XORing the secret key, and the resulting tag is derived from the final state and key. The verified decryption process mirrors encryption, generating plaintext only if the calculated tag matches the received tag. Ascon's security relies on two 320-bit permutations, Pa and Pb, incorporating round constants, S-boxes, and linear diffusion layers. The methodology emphasizes the efficiency of bit-sliced operations and lookup tables. In conclusion, Ascon provides a secure and efficient authenticated encryption scheme with key components like permutation processes, specific encryption stages, and tag verification during decryption. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 22MECV15; | - |
dc.subject | EC 2021 | en_US |
dc.subject | Project Report | en_US |
dc.subject | Project Report 2022 | en_US |
dc.subject | EC Project Report | en_US |
dc.subject | EC (VLSI) | en_US |
dc.subject | VLSI | en_US |
dc.subject | VLSI 2022 | en_US |
dc.subject | 22MEC | en_US |
dc.subject | 22MECV | en_US |
dc.subject | 22MECV15 | en_US |
dc.title | 128-bit ASCON Security IP For Automotive Interfaces | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, EC (VLSI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
22MECV15.pdf | 22MECV15 | 4.19 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.