Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

NIST Issues Lightweight Crypto Standard

August 25, 2025
Reading Time: 3 mins read
in News
New Malware Pushes Cybercrime Limits

The National Institute of Standards and Technology (NIST) has officially released NIST Special Publication 800-232, a landmark standard that designates the Ascon family of algorithms as the new benchmark for lightweight cryptography. This move addresses a critical security vulnerability in the burgeoning landscape of resource-constrained devices, such as those used in the Internet of Things (IoT), embedded systems, and low-power sensors. Traditional cryptographic solutions, like AES-GCM, are often too resource-intensive for these devices, leaving them vulnerable to cyberattacks. Published in August 2025, this groundbreaking standard provides a highly efficient and secure alternative that enables robust data protection without the prohibitive computational overhead.

The Ascon family is a versatile suite of four cryptographic primitives, each serving a distinct security function. At its core is Ascon-AEAD128, an authenticated encryption scheme that provides 128-bit security for single-key applications. For data integrity and verification, the standard includes Ascon-Hash256, a cryptographic hash function that produces a 256-bit digest with 128-bit security. The family is completed by two eXtendable Output Functions (XOFs): Ascon-XOF128 and Ascon-CXOF128. The latter is particularly notable for its customization string capabilities, which allow for domain separation and ensure distinct outputs even when the inputs are identical. All these algorithms are built upon a common foundation: the Ascon-p permutation, ensuring a cohesive and efficient design.

The Ascon standard is built on a Substitution-Permutation Network (SPN) structure. This robust design operates on a 320-bit internal state that is logically divided into five 64-bit words. The core of the system is the permutation function, which consists of a three-layered process: constant-addition, substitution, and linear diffusion. This layered approach provides strong cryptographic security while maintaining the computational efficiency essential for lightweight applications. Key technical specifications include a 128-bit rate and 192-bit capacity for Ascon-AEAD128, while hash functions operate with a 64-bit rate and 256-bit capacity. NIST has also mandated specific initial values (IVs) for each algorithm to ensure proper separation and functionality.

NIST’s new standard goes beyond basic encryption to incorporate a range of advanced security measures. One notable feature is the option for nonce-masking, which helps maintain full 128-bit security regardless of the number of keys used. The specification also addresses the practical need for authentication tag truncation, setting a minimum of 32-bit tags while advising careful risk analysis for any tags shorter than 64 bits. To prevent potential attacks and maintain security margins, the standard establishes a data processing limit of 2⁵⁴ bytes per key. These comprehensive measures collectively ensure robust protection against forgery attempts and other security threats, all while being tailored to the practical constraints of resource-limited environments.

The official release of the Ascon standard is a significant milestone for the future of digital security. By providing a secure, efficient, and standardized cryptographic solution, NIST is enabling the secure deployment of countless new devices in the IoT ecosystem. This move will help to foster innovation and trust in a world increasingly filled with connected devices, from smart home gadgets to industrial sensors. The widespread adoption of the Ascon algorithms is expected to bolster the security posture of the global IoT network, protecting sensitive data and critical infrastructure from emerging threats. As the digital world continues to expand, NIST Special Publication 800-232 ensures that security can keep pace with connectivity, even in the smallest of devices.

Reference:

  • NIST Publishes ‘Lightweight Cryptography’ Standard to Secure IoT Devices
Tags: August 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Glilot Capital Raises 500 Million Fund

Glilot Capital Raises 500 Million Fund

September 18, 2025
Glilot Capital Raises 500 Million Fund

Researchers Uncover Ransomware Links

September 18, 2025
Glilot Capital Raises 500 Million Fund

DOJ Resentences BreachForums Founder

September 18, 2025
RaccoonO365 Phishing Network Down

RaccoonO365 Phishing Network Down

September 17, 2025
Windows 10 Support Ends in 30 Days

Windows 10 Support Ends in 30 Days

September 17, 2025
RaccoonO365 Phishing Network Down

Exchange 2016, 2019 Support Ends Soon

September 17, 2025

Latest Alerts

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

ChatGPT Calendar Flaw Lets Email Theft

Windows Update Breaks SMBv1 Shares

Scattered Spider Returns Despite Exit

Subscribe to our newsletter

    Latest Incidents

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    DHS Data Hub Leaked Sensitive Intel

    Worm Infects 180 npm Packages

    Jaguar Land Rover Delays Restart After Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial