This is now the best encryption method for IoT devices, experts claim

Hands working on laptops touching diagram of chain and encrypted blocks
(Image credit: Shutterstock)

After four years of testing, the US National Institute of Standards and Technology (NIST) has announced its favorite encryption method for “lightweight cryptography”, designed to work on low-powered IoT devices.

Connected IoT devices, like wearables, smart home gadgets and even vehicle-to-vehicle technologies are all around us, and key to their success is their small size. This comes with its own challenges, though, including less powerful chips than we would typically see in a smartphone or computer. These are less capable of handling traditionally heavier encryption methods, hence the introduction of a new standard. 

Optimized encryption will allow smaller devices to be able to handle sensitive personal information, which may be great for users of wearables who want to be able to access their health data, for instance.

TechRadar Pro needs you!
We want to build a better website for our readers, and we need your help! You can do your bit by filling out our survey and telling us your opinions and views about the tech industry in 2023. It will only take a few minutes and all your answers will be anonymous and confidential. Thank you again for helping us make TechRadar Pro even better.

D. Athow, Managing Editor

ASCON encryption

The program saw a total of 57 proposals, which were later whittled down to 10 finalists. An announcement explains:

“The decision was challenging since most of the finalists exhibited performance advantages over NIST standards on various target platforms without introducing security concerns.”

Ultimately, ASCON was chosen for its flexibility, energy efficiency, and its ability to run smoothly on less powerful hardware. It was also merited for its longevity, having been around since 2014 and withstanding “years of examination by cryptographers”.

NIST computer scientist, Kerry McKay, explained that “one of the ASCON variants offers a measure of resistance to the sort of attack a powerful quantum computer might mount”, indicating an impressive resilience.

That said, NIST has already started work on quantum-safe public-key cryptographic algorithms, which opened with 82 proposals. 

What this means going forward is that soon, there will be a significant increase in the number of devices able to share information safely, as the age of seamless connectivity draws nearer.

Craig Hale

With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!

Read more
Optical system for data encryption
Is it quantum-resistant? Researchers create 'uncrackable' encryption system by pairing AI and holograms produced by laser
ExpressVPN Lightway Protocol
ExpressVPN upgrades to post-quantum encryption NIST standards
Concept art representing cybersecurity principles
Best encryption software of 2025
AdGuard VPN during TechRadar tests
AdGuard becomes the latest VPN to add post-quantum encryption
A VPN runs on a mobile phone placed on a laptop keyboard
The 3 biggest VPN innovations of 2024 – what does the future hold?
best Secure VPN
Secure VPN providers 2025: safe options for the best security and encryption
Latest in Security
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in News
Apple iPhone 16 Pro Max REVIEW
The latest batch of leaked iPhone 17 dummy units appear to show where glass meets metal on the new designs
Hornet swings their weapon in mid air
Hollow Knight: Silksong could potentially launch this year and I reckon it could be a great game for an Xbox handheld
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Cassian looking at someone off-camera from a TIE fighter cockpit in Andor season 2
Star Wars: Andor creator is taking a stance against AI by canceling plans to release its scripts, and I completely get why
Nintendo x Seattle Mariners partnership
The Nintendo Switch 2 logo will be featured on the Seattle Mariners' baseball jerseys this season
Apple iPhone 16 Pro Max Review
Siri's chances to beat ChatGPT just got a whole lot better