Customer Service:
Mon - Fri: 8:30 am - 6 pm EST

Lightweight Cryptography

Lightweight cryptography standards are published by IEC and ISO. They include the ISO/IEC 29192 series, which covers block ciphers, stream ciphers, asymmetric techniques, and hash functions.


ISO/IEC 29192-1:2012

Information technology - Security techniques - Lightweight cryptography - Part 1: General

ISO/IEC 29192-1:2012 provides terms and definitions that apply in subsequent parts of ISO/IEC 29192. ISO/IEC 29192-1:2012 sets the security requirements, classification requirements and implementation requirements for mechanisms that are proposed for inclusion in subsequent parts of ISO/IEC 29192.


ISO/IEC 29192-2:2019

Information security - Lightweight cryptography - Part 2: Block ciphers

This document specifies three block ciphers suitable for applications requiring lightweight cryptographic implementations: PRESENT: a lightweight block cipher with a block size of 64 bits and a key size of 80 or 128 bits; CLEFIA: a lightweight block cipher with a block size of 128 bits and a key size of 128, 192 or 256 bits; LEA: a lightweight block cipher with a block size of 128 bits and a key size of 128, 192 or 256 bits.


ISO/IEC 29192-3:2012

Information technology - Security techniques - Lightweight cryptography - Part 3: Stream ciphers

ISO/IEC 29192-3:2012 specifies two dedicated keystream generators for lightweight stream ciphers: Enocoro: a lightweight keystream generator with a key size of 80 or 128 bits; Trivium: a lightweight keystream generator with a key size of 80 bits.


ISO/IEC 29192-4:2013

Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques

ISO/IEC 29192-4:2013 specifies three lightweight mechanisms using asymmetric techniques: a) a unilateral authentication mechanism based on discrete logarithms on elliptic curves; b) an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key; c) an identity-based signature mechanism.


ISO/IEC 29192-5:2016

Information technology - Security techniques - Lightweight cryptography - Part 5: Hash-functions

ISO/IEC 29192-5:2016 specifies three hash-functions suitable for applications requiring lightweight cryptographic implementations. - PHOTON: a lightweight hash-function with permutation sizes of 100, 144, 196, 256 and 288 bits computing hash-codes of length 80, 128, 160, 224, and 256 bits, respectively. - SPONGENT: a lightweight hash-function with permutation sizes of 88, 136, 176, 240 and 272 bits computing hash-codes of length 88, 128, 160, 224, and 256 bits, respectively. - Lesamnta-LW: a lightweight hash-function with permutation size 384 bits computing a hash-code of length 256 bits. The requirements for lightweight cryptography are given in ISO/IEC 29192 1.


ANSI Logo

As the voice of the U.S. standards and conformity assessment system, the American National Standards Institute (ANSI) empowers its members and constituents to strengthen the U.S. marketplace position in the global economy while helping to assure the safety and health of consumers and the protection of the environment.

CUSTOMER SERVICE
NEW YORK OFFICE
ANSI HEADQUARTERS