AEAD (Authenticated Encryption with Associated Data)
AEAD algorithms provide confidentiality, authenticity, and integrity in a single cryptographic primitive. They encrypt data while simultaneously generating an authentication tag, and can authenticate additional associated data without encrypting it.
Core AEAD Algorithms
🔐 ChaCha20-Poly1305
Modern stream cipher with polynomial authenticator, standardized in TLS 1.3.
🏛️ AES-256-GCM
Industry standard with hardware acceleration support and widespread adoption.
🛡️ Deoxys-II
CAESAR finalist with unique nonce-misuse resistance properties.
⚡ Ascon-128
NIST Lightweight Cryptography standard for IoT and embedded systems.
Why Choose AEAD?
- Simplified Design: Single operation for encryption + authentication
- Performance: Optimized implementations avoid duplicate processing
- Security: Prevents implementation errors from separate encrypt/MAC steps
- Flexibility: Associated data authentication without encryption
Quick Selection Guide
| Use Case | Recommended Algorithm |
|---|---|
| Web/TLS Applications | ChaCha20-Poly1305 |
| Enterprise/Hardware | AES-256-GCM |
| High Security | Deoxys-II |
| IoT/Embedded | Ascon-128 |
| Mobile Apps | ChaCha20-Poly1305 |