Skip to main content Scroll Top

NIST Selects Internet of Things (IoT) Crypto Standard

NIST

It is often the smallest components that play the most vital role, and the National Institute of Standards and Technology (NIST) has addressed this fact with the release of its new finalized lightweight cryptography standard. Created to protect even the most resource-constrained networked devices from cyberattacks, this standard offers advanced cryptographic defenses designed for limited environments.

Formally titled Ascon-Based Lightweight Cryptography Standards for Constrained Devices (NIST Special Publication 800-232), the publication introduces a set of cryptographic tools intended to safeguard information generated and transmitted by the billions of devices that make up the Internet of Things (IoT), as well as other small-scale electronics such as RFID tags and medical implants. While these miniature technologies typically have far fewer computational resources than traditional computers or smartphones, their exposure to security threats remains significant. Lightweight cryptography offers an effective means of securing such devices without overtaxing their limited processing capabilities.

According to NIST computer scientist Kerry McKay, who co-led the project with fellow NIST researcher Meltem Sönmez Turan, “We encourage the use of this new lightweight cryptography standard wherever resource constraints have hindered the adoption of cryptography. It will benefit industries that build devices ranging from smart home appliances to car-mounted toll registers to medical implants. One thing these electronics have in common is the need to fine-tune the amount of energy, time, and space it takes to do cryptography. This standard fits their needs.”

Why Ascon?

In 2023, NIST concluded its multi-year search for a lightweight cryptography standard by selecting the Ascon family of algorithms. Designed by Dobraunig, Eichlseder, Mendel, and Schläffer, Ascon was chosen for its ability to deliver strong cryptographic protection in resource-constrained environments—where computing power, memory, and energy are limited. This makes it particularly well-suited for IoT devices, embedded systems, and low-power sensors.

Ascon’s strength lies in its permutation-based, lightweight design, which allows it to maintain high security while minimizing computational overhead. These characteristics make it a practical choice when traditional algorithms like the Advanced Encryption Standard (AES) may not operate efficiently.

The family supports:

  • Authenticated Encryption with Associated Data (AEAD) – for encrypting data while verifying integrity and authenticity.
  • Hashing Functions – for secure message digests.
  • eXtendable Output Functions (XOF) – for flexible-length outputs in cryptographic operations.

Rigorous Selection Process

NIST’s decision followed a multi-round evaluation of candidate algorithms from around the world. Criteria included:

  • Security resilience against known attacks.
  • Performance in constrained hardware and software environments.
  • Implementation flexibility for different use cases.

Ascon consistently performed well across these benchmarks, showing robustness and adaptability.

The Ascon Suite

The finalized standard covers:

  • Ascon-AEAD128 – Authenticated encryption for secure communications.
  • Ascon-Hash256 – High-assurance hashing.
  • Ascon-XOF128 – Variable-length output generation.
  • Ascon-CXOF128 – A customizable version of XOF for specialized applications.

Impact on the Future of IoT Security

With billions of connected devices projected to come online in the next decade, lightweight cryptography will play a crucial role in securing data, identities, and transactions without overloading hardware. Ascon’s adoption as a NIST standard provides a clear path for developers, manufacturers, and security professionals to integrate efficient encryption into their products.

Bottom line: Ascon is poised to become the go-to cryptographic solution for devices and applications where efficiency and security must coexist.

0

image sources

  • IOT: Topgallant Partners ©2025 | All Rights Reserved

Related Posts

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.