{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:39:48Z","timestamp":1775745588612,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Internet of Things (IoT) nodes consist of sensors that collect environmental data and then perform data exchange with surrounding nodes and gateways. Cybersecurity attacks pose a threat to the data security that is being transmitted in any IoT network. Cryptographic primitives are widely adopted to address these threats; however, the substantial computation demands limit their applicability in the IoT ecosystem. In addition, each IoT node varies with respect to the area and throughput (TP) requirements, thus demanding flexible implementation for encryption\/decryption processes. To solve these issues, this work implements the NIST lightweight cryptography standard, Ascon, on a SAED 32 nm process design kit (PDK) library by employing loop folded, loop unrolled and fully unrolled architectures. The fully unrolled architecture can achieve the highest TP but at the cost of higher area utilisation. Unrolling by a lower factor results in lower area implementations, enabling the exploration of design space to tackle the trade-off between area and TP performance of the design. The implementation results show that, for loop folded architecture, Ascon-128 and Ascon-128a require 36.7k <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\upmu \\textrm{m}^{2}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>\u03bc<\/mml:mi>\n                    <mml:msup>\n                      <mml:mtext>m<\/mml:mtext>\n                      <mml:mn>2<\/mml:mn>\n                    <\/mml:msup>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> and 38.5k <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\upmu \\textrm{m}^{2}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>\u03bc<\/mml:mi>\n                    <mml:msup>\n                      <mml:mtext>m<\/mml:mtext>\n                      <mml:mn>2<\/mml:mn>\n                    <\/mml:msup>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> chip area, respectively compared to 277.1k <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\upmu \\textrm{m}^{2}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>\u03bc<\/mml:mi>\n                    <mml:msup>\n                      <mml:mtext>m<\/mml:mtext>\n                      <mml:mn>2<\/mml:mn>\n                    <\/mml:msup>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> and 306.6k <jats:inline-formula><jats:alternatives><jats:tex-math>$$\\upmu \\textrm{m}^{2}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>\u03bc<\/mml:mi>\n                    <mml:msup>\n                      <mml:mtext>m<\/mml:mtext>\n                      <mml:mn>2<\/mml:mn>\n                    <\/mml:msup>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> required by their fully unrolled implementations. The proposed implementation strategies can adjust the number of rounds to accommodate the varied requirements of IoT ecosystems. An implementation with an open-source 45 nm PDK library is also undertaken for enhanced generalization and reproducibility of the results.<\/jats:p>","DOI":"10.1007\/s10207-024-00904-1","type":"journal-article","created":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T18:02:49Z","timestamp":1724954569000},"page":"3653-3664","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher"],"prefix":"10.1007","volume":"23","author":[{"given":"Safiullah","family":"Khan","sequence":"first","affiliation":[]},{"given":"Kashif","family":"Inayat","sequence":"additional","affiliation":[]},{"given":"Fahad Bin","family":"Muslim","sequence":"additional","affiliation":[]},{"given":"Yasir Ali","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Atif Ur Rehman","sequence":"additional","affiliation":[]},{"given":"Ayesha","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Malik","family":"Imran","sequence":"additional","affiliation":[]},{"given":"Akmalbek","family":"Abdusalomov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,29]]},"reference":[{"key":"904_CR1","doi-asserted-by":"crossref","unstructured":"Amara, M., Siad, A.: Elliptic curve cryptography and its applications. In: International Workshop on Systems, Signal Processing and Their Applications, WOSSPA, pp. 247\u2013250. IEEE (2011)","DOI":"10.1109\/WOSSPA.2011.5931464"},{"issue":"12","key":"904_CR2","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","volume":"2009","author":"S Heron","year":"2009","unstructured":"Heron, S.: Advanced encryption standard (AES). Netw. Secur. 2009(12), 8\u201312 (2009)","journal-title":"Netw. Secur."},{"key":"904_CR3","doi-asserted-by":"publisher","first-page":"14739","DOI":"10.1109\/ACCESS.2022.3147201","volume":"10","author":"MA Jimale","year":"2022","unstructured":"Jimale, M.A., Z\u2019aba, M.R., Kiah, M.L.B.M., Idris, M.Y.I., Jamil, N., Mohamad, M.S., Rohmad, M.S.: Authenticated encryption schemes: a systematic review. IEEE Access 10, 14739\u201314766 (2022)","journal-title":"IEEE Access"},{"key":"904_CR4","doi-asserted-by":"crossref","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 98\u2013107 (2002)","DOI":"10.1145\/586110.586125"},{"issue":"4","key":"904_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P.: A simple and generic construction of authenticated encryption with associated data. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 1\u201316 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"21","key":"904_CR6","doi-asserted-by":"publisher","first-page":"4752","DOI":"10.3390\/s19214752","volume":"19","author":"K Mansoor","year":"2019","unstructured":"Mansoor, K., Ghani, A., Chaudhry, S.A., Shamshirband, S., Ghayyur, S.A.K., Mosavi, A.: Securing IoT-based RFID systems: a robust authentication protocol using symmetric cryptography. Sensors 19(21), 4752 (2019)","journal-title":"Sensors"},{"key":"904_CR7","doi-asserted-by":"publisher","first-page":"24012","DOI":"10.1109\/ACCESS.2017.2768499","volume":"5","author":"C Sun","year":"2017","unstructured":"Sun, C., Liu, J., Xu, X., Ma, J.: A privacy-preserving mutual authentication resisting DoS attacks in VANETs. IEEE Access 5, 24012\u201324022 (2017)","journal-title":"IEEE Access"},{"key":"904_CR8","unstructured":"Turan, M.S., et\u00a0al.: Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process (2023)"},{"key":"904_CR9","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2. Submission to the CAESAR Competition 5(6), 7 (2016)"},{"key":"904_CR10","unstructured":"Cryptographic competitions, CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness https:\/\/competitions.cr.yp.to\/caesar.html. Accessed 12 Dec 2023"},{"key":"904_CR11","doi-asserted-by":"crossref","unstructured":"Gro\u00df, H., Wenger, E., Dobraunig, C., Ehrenh\u00f6fer, C.: Suit up!\u2014made-to-measure hardware implementations of Ascon. In: 2015 Euromicro Conference on Digital System Design, pp. 645\u2013652. IEEE (2015)","DOI":"10.1109\/DSD.2015.14"},{"key":"904_CR12","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.micpro.2016.10.006","volume":"52","author":"H Gross","year":"2017","unstructured":"Gross, H., Wenger, E., Dobraunig, C., Ehrenh\u00f6fer, C.: Ascon hardware implementations and side-channel evaluation. Microprocess. Microsyst. 52, 470\u2013479 (2017)","journal-title":"Microprocess. Microsyst."},{"key":"904_CR13","doi-asserted-by":"crossref","unstructured":"Roussel, N., Potin, O., Di Pendina, G., Dutertre, J. M., Rigaud, J.B.: CMOS\/STT-MRAM based Ascon LWC: A power efficient hardware implementation. In: 2022 29th IEEE International Conference on Electronics, Circuits and Systems (ICECS), pp. 1\u20134. IEEE (2022)","DOI":"10.1109\/ICECS202256217.2022.9971037"},{"key":"904_CR14","doi-asserted-by":"crossref","unstructured":"Yalla, P., Kaps, J. P.: Evaluation of the CAESAR hardware API for lightweight implementations. In: 2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/RECONFIG.2017.8279790"},{"key":"904_CR15","doi-asserted-by":"crossref","unstructured":"Diehl, W., Farahmand, F., Abdulgadir, A., Kaps, J. P., Gaj, K.: Face-off between the CAESAR lightweight finalists: ACORN versus Ascon. In: 2018 International Conference on Field-Programmable Technology (FPT), pp. 330\u2013333. IEEE (2018)","DOI":"10.1109\/FPT.2018.00066"},{"key":"904_CR16","unstructured":"Rezvani, B., Coleman, F., Sachin, S., Diehl, W.: Hardware implementations of NIST lightweight cryptographic candidates: a first look. In: Cryptology ePrint Archive (2019)"},{"key":"904_CR17","unstructured":"Jellema, L.: Optimizing Ascon on RISC-V. Bachelor Thesis, Radboud University (2019)"},{"issue":"14","key":"904_CR18","doi-asserted-by":"publisher","first-page":"11260","DOI":"10.1109\/JIOT.2021.3052184","volume":"8","author":"S Khan","year":"2021","unstructured":"Khan, S., Lee, W.K., Hwang, S.O.: Scalable and efficient hardware architectures for authenticated encryption in IoT applications. IEEE Internet of Things J. 8(14), 11260\u201311275 (2021)","journal-title":"IEEE Internet of Things J."},{"key":"904_CR19","unstructured":"Khan, S., Lee, W. K., Hwang, S. O.: Evaluating the performance of ascon lightweight authenticated encryption for AI-enabled IoT devices. In: 2022 TRON Symposium (TRONSHOW), pp. 1\u20136. IEEE (2022)"},{"key":"904_CR20","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Permutation-based encryption, authentication and authenticated encryption. In: Directions in Authenticated Ciphers, pp. 159\u2013170 (2012)"},{"key":"904_CR21","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications. Submission to NIST (Round 2) 3(30), 320\u2013337 (2009)"},{"key":"904_CR22","unstructured":"Standard, S. H. (1995). Secure hash standard. FIPS PUB, 180-1"},{"key":"904_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1070-5","volume-title":"Domain Specific High-Level Synthesis for Cryptographic Workloads","author":"A Khalid","year":"2019","unstructured":"Khalid, A., Paul, G., Chattopadhyay, A.: Domain Specific High-Level Synthesis for Cryptographic Workloads. Springer, Singapore (2019)"},{"key":"904_CR24","doi-asserted-by":"crossref","unstructured":"Khalid, A., Hassan, M., Chattopadhyay, A., Paul, G.: Rapid-FeinSPN: a rapid prototyping framework for Feistel and SPN-based block ciphers. In: Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16\u201320, 2013. Proceedings 9, pp. 169\u2013190. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-45204-8_13"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00904-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00904-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00904-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T01:07:14Z","timestamp":1728695234000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00904-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["904"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00904-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,29]]},"assertion":[{"value":"29 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they do not have Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}