This is a potential security issue, you are being redirected to https://csrc.nist.gov.
You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.
NIST began investigating cryptography for constrained environments in 2013. After two workshops and discussions with stakeholders in industry, government, and academia, NIST initiated a process to solicit, evaluate, and standardize schemes providing authenticated encryption with associated data (AEAD) and optional hashing functionalities for constrained environments where the performance of current NIST cryptographic standards is not acceptable.
On August 13, 2025, SP 800-232, Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions , was published. This standard specifies four functions based on the Ascon family: AEAD function Ascon-AEAD128, hash function Ascon-Hash256, eXtendable-Output Function (XOF) Ascon-XOF128, and customized XOF Ascon-CXOF128.
The timeline of the standardization process is provided here.
In November 2024, NIST released the initial public draft (ipd) of Special Publication (SP) 800-232, Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions. See the public comments submitted to NIST.
In August 2025, Ascon-AEAD128, Ascon-Hash256, Ascon-XOF128, and Ascon-CXOF128 became NIST standards in the final publication of SP 800-232, Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions.
Additional Functionalities. NIST is considering the development of a dedicated Message Authentication Code (MAC) and a variable-output-length pseudorandom function (PRF) based on the Ascon family in a future standard.
NIST thanks the submission teams, who developed and designed the candidates; the cryptographic community, who analyzed the candidates, shared their comments through the lwc-forum, and published papers on various technical aspects of the candidates; the developers who provided optimized implementations of the candidates; and organizers of hardware and software benchmarking initiatives, for their contributions in understanding the performance characteristics of the algorithms on various target platforms.
Lightweight Crypto Technical Inquiries
[email protected]
Dr. Kerry McKay
Meltem Sönmez Turan
Security and Privacy: lightweight cryptography
Round 1 Round 2 Finalists Related Publications Performance Benchmarking Timeline Email List (lwc-forum)
Lightweight Crypto Technical Inquiries
[email protected]
Dr. Kerry McKay
Meltem Sönmez Turan
Security and Privacy: lightweight cryptography