Guido Bertoni3, Joan Daemen2, Seth Hoffert, Michaël Peeters1, Gilles Van Assche1 and Ronny Van Keer1
1STMicroelectronics - 2Radboud University - 3Security Pattern
Xoodyak is a lightweight, versatile, cryptographic scheme suitable in constrained environments. It can be used for hashing, encryption, MAC computation and authenticated encryption.
Xoodyak builds upon the Xoodoo permutations and the duplex construction.
| Synopsis | The Xoodyak scheme |
|---|---|
| Designed by | Joan Daemen, Seth Hoffert, Silvia Mella, Michaël Peeters, Gilles Van Assche and Ronny Van Keer |
| Implements | A versatile cryptographic scheme that can be used for hashing, encryption, MAC computation and authenticated encryption. |
| Construction | The duplex construction |
| Primitive | The Xoodoo[12] permutation |
| Parameterized by | No parameter |
| Instances | Just Xoodyak. |
| Status | Finalist in the NIST lightweight cryptography standardization process |
Resources: