Guido Bertoni3, Joan Daemen2, Seth Hoffert, Michaël Peeters1, Gilles Van Assche1 and Ronny Van Keer1
1STMicroelectronics - 2Radboud University - 3Security Pattern
Xoodyak is a lightweight, versatile, cryptographic scheme suitable in constrained environments. It can be used for hashing, encryption, MAC computation and authenticated encryption.
Xoodyak builds upon the Xoodoo permutations and the duplex construction.
Synopsis | The Xoodyak scheme |
---|---|
Designed by | Joan Daemen, Seth Hoffert, Silvia Mella, Michaël Peeters, Gilles Van Assche and Ronny Van Keer |
Implements | A versatile cryptographic scheme that can be used for hashing, encryption, MAC computation and authenticated encryption. |
Construction | The duplex construction |
Primitive | The Xoodoo[12] permutation |
Parameterized by | No parameter |
Instances | Just Xoodyak. |
Status | Finalist in the NIST lightweight cryptography standardization process |
Resources: