Paper 2023/794

Areion: Highly-Efficient Permutations and Its Applications (Extended Version)

Takanori Isobe, University of Hyogo, National Institute of Information and Communications Technology
Ryoma Ito, National Institute of Information and Communications Technology
Fukang Liu, University of Hyogo
Kazuhiko Minematsu, NEC
Motoki Nakahashi, University of Hyogo
Kosei Sakamoto, University of Hyogo
Rentaro Shiba, Mitsubishi Electric Corporation

In real-world applications, the overwhelming majority of cases require (authenticated) encryption or hashing with relatively short input, say up to 2K bytes. Almost all TCP/IP packets are 40 to 1.5K bytes, and the maximum packet lengths of major protocols, e.g., Zigbee, Bluetooth low energy, and Controller Area Network (CAN), are less than 128 bytes. However, existing schemes are not well optimized for short input. To bridge the gap between real-world needs (in the future) and limited performances of state-of-the-art hash functions and authenticated encryptions with associated data (AEADs) for short input, we design a family of wide-block permutations Areion that fully leverages the power of AES instructions, which are widely deployed in many devices. As for its applications, we propose several hash functions and AEADs. Areion significantly outperforms existing schemes for short input and even competitive to relatively long messages. Indeed, our hash function is surprisingly fast, and its performance is less than three cycles/byte in the latest Intel architecture for any message size. It is significantly much faster than existing state-of-the-art schemes for short messages up to around 100 bytes, which are the most widely-used input size in real-world applications, on both the latest CPU architectures (IceLake, Tiger Lake, and Alder Lake) and mobile platforms (Pixel 7, iPhone 14, and iPad Pro with Apple M2).

Available format(s)
Secret-key cryptography
Publication info
A major revision of an IACR publication in TCHES 2023
Short messageAES instructionhash functionauthenticated encryptionbeyond 5GIoT
Contact author(s)
takanori isobe @ ai u-hyogo ac jp
itorym @ nict go jp
liufukangs @ gmail com
k-minematsu @ nec com
motoki n1998 @ gmail com
k sakamoto0728 @ gmail com
shiba rentaro @ dc mitsubishielectric co jp
2023-09-21: last of 2 revisions
2023-05-31: received
See all versions
Short URL
Creative Commons Attribution


      author = {Takanori Isobe and Ryoma Ito and Fukang Liu and Kazuhiko Minematsu and Motoki Nakahashi and Kosei Sakamoto and Rentaro Shiba},
      title = {Areion: Highly-Efficient Permutations and Its Applications (Extended Version)},
      howpublished = {Cryptology ePrint Archive, Paper 2023/794},
      year = {2023},
      doi = {10.46586/tches.v2023.i2.115-154},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.