Abstract
Objective: The objective was to observe the behavior, correctness, and functional robustness of the ASCON-128 RTL implementation when verified using NIST test vectors. While the current aim is a general implementation, a synthesizable verified and ASIC-oriented hardware model is aimed to be developed which aligns with the lightweight cryptography standards set by NIST.Design:
Methods: ASCON-128 is an authenticated encryption algorithm which was developed in modular structured Verilog HDL that contained a permutation core, control unit, and state management logic which was complemented with functional verification using Cadence Xcelium along with NIST test vectors for verification of encryption, decryption, and generation of authentication tags.
Design: RTL implementation and verification study based on functional observation and simulation analysis.
Results: For the RTL simulation, the full functional correctness was verified and NIST reference ciphertexts and tags demonstrated exact matches. The design security integrity was validated due to the design robustness against altered inputs.
Conclusion: The RTL design in Verilog illustrates a secure and verified starting point for lightweight cryptography that is appropriate for ASIC implementation in IoT devices. This work paves the synthesis, power optimization and other more complex architectures that can be developed in future.
Key words: ASCON-128, Authenticated Encryption, IoT security, RTL design, Verilog
Downloads
References
- 1] M. S. Turan, K. A. McKay, D. Chang, J. Kang, and J. Kelsey, Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions, NIST Special Publication 800-232, 2025.
- [2] M. El-Hadedy, R. Hua, K. Yoshii, and W.-M. Hwu, Optimizing ASCON Permutation in Multi-Clock Domains with Chisel: Resource Efficiency and Critical Path Reduction, 2025. [Conference/Journal info not available]
- [3] K.-D. Nguyen, T.-K. Dang, B. Kieu-Do-Nguyen, D.-H. Le, C.-K. Pham, and T.-T. Hoang, ASIC Implementation of ASCON Lightweight Cryptography for IoT Applications, IEEE Trans Circuits Syst I: Regular Papers, vol. 72, no. 5, pp. 1234–1245, May 2025.
- [4] H. Groß, E. Wenger, C. Dobraunig, and C. Ehrenhofer, Suit up!—Made-to-Measure Hardware Implementations of ASCON, 2025. [Conference/Journal info not available]
- [5] R. Weatherley, Additional Modes for ASCON, Version 1.1, Southern Storm Software, 2023. Available: https://github.com/rweather/ascon-suite
- [6] C. Dobraunig, H. Groß, and M. Eichlseder, ASCON Lightweight Authenticated Encryption and Hash Function Reference Implementation in C, 2023. Available: https://github.com/ascon/ascon-c
- [7] A. Malal, High-Performance FPGA Implementations of Lightweight ASCON-128 and ASCON-128a with Enhanced Throughput-to-Area Efficiency, IACR Cryptology ePrint Archive, Preprint, 2025. Available: https://eprint.iacr.org/2025
- [8] S. H. Prasad, F. Mendel, M. Schläffer, and R. Nagpal, Efficient Low-Latency Masking of Ascon without Fresh Randomness, IACR Cryptology ePrint Archive, 2023. Available: https://eprint.iacr.org/2023
- [9] ASCON v1.2 Submission to NIST (official spec document), ASCON: Submission to NIST Lightweight Cryptography Standardization, 2023. Available: https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/ascon-spec-final.pdf
- [10] M. Mirigaldi, V. Piscopo, M. Martina, and G. Masera, The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges, Chips, 2025. MDPI.
Similar Articles
- Hemant Sahu, Pushpraj Singh, Zonal Estimation of Paddy Straw Based Bioenergy Potential using Landsat 8 OLI Satellite Imagery , International Journal of Science and Engineering Invention: Vol. 9 No. 09 (2023)
- Cesar Ramiro Bermeo Toledo, Luis Tarquino Llerena Ramos, Paula Marisol Plaza Zambrano, Response of the Pepper Cultivation (Capsicum anuumm) to four Bioestimulantes in three Areas of the Province of Los Rios , International Journal of Science and Engineering Invention: Vol. 3 No. 01 (2017)
- Hamze Rouhi, Evaluation of Seismic Vulnerability of Specially Reinforced Concrete Frames (SRCF) by FEMA-P695 Method , International Journal of Science and Engineering Invention: Vol. 9 No. 08 (2023)
- Luis Tarquino Llerena Ramos, Cesar Ramiro Bermeo Toledo, Paula Marisol v, Evaluation of Different Types of Substrates in Cocoa Nursery (Theobroma Cacao L.) , International Journal of Science and Engineering Invention: Vol. 3 No. 03 (2017)
- Okoli Constance, Osi, David Ogbonna, ADEQUACY OF FUNDING FOR SKILL ACQUISITION IN ENTREPRENEURSHIP DEVELOPMENT CENTRES IN TERTIARY INSTITUTIONS IN ENUGU STATE , International Journal of Science and Engineering Invention: Vol. 6 No. 02 (2020)
- Xu Peng, Wang Yingying, Tian Jianxin, Fan Dongdong, Gao Shuai, Preparation of Hydrated Calcium Silicate High Filler Ink and Study on Printing Suitability , International Journal of Science and Engineering Invention: Vol. 5 No. 09 (2019)
- M Neeharika, Prabhat Kumar Hensh, Estimation of Leakage Mass Flow Rate through Labyrinth Seal Using CFD Techniques , International Journal of Science and Engineering Invention: Vol. 3 No. 07 (2017)
- Andrew Chubykalo, Augusto Espinoza, Viktor Kuligin, Magnetic Flow Scattering in Ferrite Rings , International Journal of Science and Engineering Invention: Vol. 5 No. 12 (2019)
- Mayur Rane, Kenil Shah, Dr. Vahid Emamian, Blood Pressure Estimation Using Electrocardiogram and Photoplethysmogram , International Journal of Science and Engineering Invention: Vol. 4 No. 11 (2018)
- Aekram Faisal, Asep Hermawan, Willy Arafah, The Influence of Strategic Orientation on Firm Performance Mediated by Social Media Orientation at MSMEs , International Journal of Science and Engineering Invention: Vol. 4 No. 08 (2018)
You may also start an advanced similarity search for this article.
Copyrights & License

This work is licensed under a Creative Commons Attribution 4.0 International License.