Implementation of the Ascon authentication algorithm in IoT devices

This thesis addresses the implementation of Ascon, a lightweight encryption algorithm, on IoT devices. This algorithm emerges in response to the growing need to secure communications between these devices, given their processing and hardware constraints, and it emerged as the winner of the NIST comp...

Full description

Autores:
Cagua Bolívar, Gabriela
Tipo de recurso:
Trabajo de grado de pregrado
Fecha de publicación:
2023
Institución:
Universidad de los Andes
Repositorio:
Séneca: repositorio Uniandes
Idioma:
eng
OAI Identifier:
oai:repositorio.uniandes.edu.co:1992/73793
Acceso en línea:
https://hdl.handle.net/1992/73793
Palabra clave:
IoT
Authentication
Encryption
Cybersecurity
Ingeniería
Rights
embargoedAccess
License
Attribution 4.0 International
id UNIANDES2_580a78d18893cab22be2c89ae43bda81
oai_identifier_str oai:repositorio.uniandes.edu.co:1992/73793
network_acronym_str UNIANDES2
network_name_str Séneca: repositorio Uniandes
repository_id_str
dc.title.eng.fl_str_mv Implementation of the Ascon authentication algorithm in IoT devices
title Implementation of the Ascon authentication algorithm in IoT devices
spellingShingle Implementation of the Ascon authentication algorithm in IoT devices
IoT
Authentication
Encryption
Cybersecurity
Ingeniería
title_short Implementation of the Ascon authentication algorithm in IoT devices
title_full Implementation of the Ascon authentication algorithm in IoT devices
title_fullStr Implementation of the Ascon authentication algorithm in IoT devices
title_full_unstemmed Implementation of the Ascon authentication algorithm in IoT devices
title_sort Implementation of the Ascon authentication algorithm in IoT devices
dc.creator.fl_str_mv Cagua Bolívar, Gabriela
dc.contributor.advisor.none.fl_str_mv Lozano Garzón, Carlos Andrés
Gauthier Umaña, Valerie Elisabeth
dc.contributor.author.none.fl_str_mv Cagua Bolívar, Gabriela
dc.contributor.researchgroup.none.fl_str_mv Facultad de Ingeniería
dc.subject.keyword.eng.fl_str_mv IoT
Authentication
Encryption
Cybersecurity
topic IoT
Authentication
Encryption
Cybersecurity
Ingeniería
dc.subject.themes.spa.fl_str_mv Ingeniería
description This thesis addresses the implementation of Ascon, a lightweight encryption algorithm, on IoT devices. This algorithm emerges in response to the growing need to secure communications between these devices, given their processing and hardware constraints, and it emerged as the winner of the NIST competition on lightweight encryption algorithms due to its robustness and level of protection. The implementation is conducted considering the constraints of the CupCarbon simulator, designed for simulating smart cities and sensor networks. Results obtained in terms of latency from the implementation are analyzed, focusing on response times and resource consumption. Similarly, the implementation of ASCON on Raspberry Pi devices in a context closer to real-world devices is performed. These devices serve as a validation platform to assess the feasibility of the encryption algorithm with limited resources. The analysis of this adaptation highlights its efficiency in IoT devices with constraints on computational capacity. The results obtained from both proposed implementations allow concluding on the viability of ASCON, confirming its ability to secure communications between IoT devices adapted to real-world needs.
publishDate 2023
dc.date.issued.none.fl_str_mv 2023-12-15
dc.date.accessioned.none.fl_str_mv 2024-02-02T13:29:01Z
dc.date.accepted.none.fl_str_mv 2024-02-01
dc.date.available.none.fl_str_mv 2025-12-31
dc.type.none.fl_str_mv Trabajo de grado - Pregrado
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/bachelorThesis
dc.type.version.none.fl_str_mv info:eu-repo/semantics/acceptedVersion
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_7a1f
dc.type.content.none.fl_str_mv Text
dc.type.redcol.none.fl_str_mv http://purl.org/redcol/resource_type/TP
format http://purl.org/coar/resource_type/c_7a1f
status_str acceptedVersion
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/1992/73793
dc.identifier.instname.none.fl_str_mv instname:Universidad de los Andes
dc.identifier.reponame.none.fl_str_mv reponame:Repositorio Institucional Séneca
dc.identifier.repourl.none.fl_str_mv repourl:https://repositorio.uniandes.edu.co/
url https://hdl.handle.net/1992/73793
identifier_str_mv instname:Universidad de los Andes
reponame:Repositorio Institucional Séneca
repourl:https://repositorio.uniandes.edu.co/
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.references.none.fl_str_mv Standards, National Institute of and Technology (2023). NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices. url: https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography algorithms-protect-small-devices (visited on 01/10/2024).
all, IoT for (2020). 5 Worst IoT Hacking Vulnerabilities. url: https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities(visited on 01/10/2024).
Jurcut, Anca et al. (2020). “Security considerations for Internet of Things: A survey”. In: SN Computer Science 1, pp. 1–19.
Lopez-Pavon, Cristina, Sandra Sendra, and Juan F Valenzuela-Valdés (2018). “Eval uation of CupCarbon network simulator for wireless sensor networks”. In:Network Protocols and Algorithms 10.2, pp. 1–27.
Sey, Dylan (2018). “A survey on authentication methods for the Internet of Things”. In: PeerJ Preprints 6, e26474v2.
Yang, Yuchen et al. (2017). “A survey on security and privacy issues in Internet-of Things”. In: IEEE Internet of things Journal 4.5, pp. 1250–1258. Dobraunig, Christoph et al. (2016). “Ascon v1. 2”. In: Submission to the CAESAR Competition 5.6, p. 7.
Company, McKinsey (2015). The Internet of Things: Mapping the Value Beyond the Hype. url: https://www.mckinsey.com/~/media/mckinsey/industries/technology%20media%20and%20telecommunications/high%20tech/our%20insights/the%20internet%20of%20things%20the%20value%20of%20digitizing%20the%20physical%20world/the-internet-of-things-mapping-the-value-beyond-the-hype.pdf (visited on 01/10/2024).
Society, Internet (2015). El Internet de las cosas: una visión general. url: https://www.internetsociety.org/wp-content/uploads/2017/09/report InternetOfThings-20160817-es-1.pdf (visited on 01/10/2024).
Mehdi, Kamal et al. (2014). “Cupcarbon: A multi-agent and discrete event wireless sensor network design and simulation tool”. In: Seventh International Conference on Simulation Tools and Techniques
dc.rights.en.fl_str_mv Attribution 4.0 International
dc.rights.uri.none.fl_str_mv http://creativecommons.org/licenses/by/4.0/
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/embargoedAccess
dc.rights.coar.none.fl_str_mv http://purl.org/coar/access_right/c_f1cf
rights_invalid_str_mv Attribution 4.0 International
http://creativecommons.org/licenses/by/4.0/
http://purl.org/coar/access_right/c_f1cf
eu_rights_str_mv embargoedAccess
dc.format.extent.none.fl_str_mv 43 páginas
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidad de los Andes
dc.publisher.program.none.fl_str_mv Ingeniería de Sistemas y Computación
dc.publisher.faculty.none.fl_str_mv Facultad de Ingeniería
dc.publisher.department.none.fl_str_mv Departamento de Ingeniería Sistemas y Computación
publisher.none.fl_str_mv Universidad de los Andes
institution Universidad de los Andes
bitstream.url.fl_str_mv https://repositorio.uniandes.edu.co/bitstreams/ddf3d133-890b-4e2f-b1e2-24417ea7764c/download
https://repositorio.uniandes.edu.co/bitstreams/b48824d7-60ee-4253-94b3-5ed6616cae2e/download
https://repositorio.uniandes.edu.co/bitstreams/709b23d0-e4d5-46c6-9997-9de44a544fce/download
https://repositorio.uniandes.edu.co/bitstreams/bb5c385d-5f9c-4949-a45e-219fdaddc6b9/download
https://repositorio.uniandes.edu.co/bitstreams/3fdce07f-9110-4edf-9711-1e36a4b5393d/download
https://repositorio.uniandes.edu.co/bitstreams/7db2a978-57a9-4177-99f5-cc56f619b233/download
https://repositorio.uniandes.edu.co/bitstreams/e0e6fb3f-0524-4b20-b3a4-2e71200c42eb/download
https://repositorio.uniandes.edu.co/bitstreams/42e9c4f4-c23a-4cfa-b3d1-1d71bb51bfa0/download
bitstream.checksum.fl_str_mv 4b83d80be1095266539bf0abfb1bb62f
a1f7b56762b29ffa086c650e383df349
0175ea4a2d4caec4bbcc37e300941108
ae9e573a68e7f92501b6913cc846c39f
b729dee7d871350edfce2e2a67f3e197
0a5f525d9cd335cc192b0d907b6b70d6
7488a4aceb638b823b2732292a0b5307
9e31af6863da6a452d41f246a3810e6a
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio institucional Séneca
repository.mail.fl_str_mv adminrepositorio@uniandes.edu.co
_version_ 1812133903895363584
spelling Lozano Garzón, Carlos AndrésGauthier Umaña, Valerie ElisabethCagua Bolívar, GabrielaFacultad de Ingeniería2024-02-02T13:29:01Z2025-12-312023-12-152024-02-01https://hdl.handle.net/1992/73793instname:Universidad de los Andesreponame:Repositorio Institucional Sénecarepourl:https://repositorio.uniandes.edu.co/This thesis addresses the implementation of Ascon, a lightweight encryption algorithm, on IoT devices. This algorithm emerges in response to the growing need to secure communications between these devices, given their processing and hardware constraints, and it emerged as the winner of the NIST competition on lightweight encryption algorithms due to its robustness and level of protection. The implementation is conducted considering the constraints of the CupCarbon simulator, designed for simulating smart cities and sensor networks. Results obtained in terms of latency from the implementation are analyzed, focusing on response times and resource consumption. Similarly, the implementation of ASCON on Raspberry Pi devices in a context closer to real-world devices is performed. These devices serve as a validation platform to assess the feasibility of the encryption algorithm with limited resources. The analysis of this adaptation highlights its efficiency in IoT devices with constraints on computational capacity. The results obtained from both proposed implementations allow concluding on the viability of ASCON, confirming its ability to secure communications between IoT devices adapted to real-world needs.Ingeniero de Sistemas y ComputaciónPregrado43 páginasapplication/pdfengUniversidad de los AndesIngeniería de Sistemas y ComputaciónFacultad de IngenieríaDepartamento de Ingeniería Sistemas y ComputaciónAttribution 4.0 Internationalhttp://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/embargoedAccesshttp://purl.org/coar/access_right/c_f1cfImplementation of the Ascon authentication algorithm in IoT devicesTrabajo de grado - Pregradoinfo:eu-repo/semantics/bachelorThesisinfo:eu-repo/semantics/acceptedVersionhttp://purl.org/coar/resource_type/c_7a1fTexthttp://purl.org/redcol/resource_type/TPIoTAuthenticationEncryptionCybersecurityIngenieríaStandards, National Institute of and Technology (2023). NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices. url: https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography algorithms-protect-small-devices (visited on 01/10/2024).all, IoT for (2020). 5 Worst IoT Hacking Vulnerabilities. url: https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities(visited on 01/10/2024).Jurcut, Anca et al. (2020). “Security considerations for Internet of Things: A survey”. In: SN Computer Science 1, pp. 1–19.Lopez-Pavon, Cristina, Sandra Sendra, and Juan F Valenzuela-Valdés (2018). “Eval uation of CupCarbon network simulator for wireless sensor networks”. In:Network Protocols and Algorithms 10.2, pp. 1–27.Sey, Dylan (2018). “A survey on authentication methods for the Internet of Things”. In: PeerJ Preprints 6, e26474v2.Yang, Yuchen et al. (2017). “A survey on security and privacy issues in Internet-of Things”. In: IEEE Internet of things Journal 4.5, pp. 1250–1258. Dobraunig, Christoph et al. (2016). “Ascon v1. 2”. In: Submission to the CAESAR Competition 5.6, p. 7.Company, McKinsey (2015). The Internet of Things: Mapping the Value Beyond the Hype. url: https://www.mckinsey.com/~/media/mckinsey/industries/technology%20media%20and%20telecommunications/high%20tech/our%20insights/the%20internet%20of%20things%20the%20value%20of%20digitizing%20the%20physical%20world/the-internet-of-things-mapping-the-value-beyond-the-hype.pdf (visited on 01/10/2024).Society, Internet (2015). El Internet de las cosas: una visión general. url: https://www.internetsociety.org/wp-content/uploads/2017/09/report InternetOfThings-20160817-es-1.pdf (visited on 01/10/2024).Mehdi, Kamal et al. (2014). “Cupcarbon: A multi-agent and discrete event wireless sensor network design and simulation tool”. In: Seventh International Conference on Simulation Tools and Techniques201812944PublicationORIGINALImplementation of the Ascon Authentication Algorithm in IoT Devices.pdfImplementation of the Ascon Authentication Algorithm in IoT Devices.pdfRestricción de acceso hasta el año 2026, se quiere subir el documento a alguna revista sin que de alto porcentaje de similitudapplication/pdf4027871https://repositorio.uniandes.edu.co/bitstreams/ddf3d133-890b-4e2f-b1e2-24417ea7764c/download4b83d80be1095266539bf0abfb1bb62fMD52autorizacion tesis - Gabriela Cagua.pdfautorizacion tesis - Gabriela Cagua.pdfHIDEapplication/pdf366629https://repositorio.uniandes.edu.co/bitstreams/b48824d7-60ee-4253-94b3-5ed6616cae2e/downloada1f7b56762b29ffa086c650e383df349MD53CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8908https://repositorio.uniandes.edu.co/bitstreams/709b23d0-e4d5-46c6-9997-9de44a544fce/download0175ea4a2d4caec4bbcc37e300941108MD54LICENSElicense.txtlicense.txttext/plain; charset=utf-82535https://repositorio.uniandes.edu.co/bitstreams/bb5c385d-5f9c-4949-a45e-219fdaddc6b9/downloadae9e573a68e7f92501b6913cc846c39fMD55TEXTImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.txtImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.txtExtracted texttext/plain60232https://repositorio.uniandes.edu.co/bitstreams/3fdce07f-9110-4edf-9711-1e36a4b5393d/downloadb729dee7d871350edfce2e2a67f3e197MD56autorizacion tesis - Gabriela Cagua.pdf.txtautorizacion tesis - Gabriela Cagua.pdf.txtExtracted texttext/plain2056https://repositorio.uniandes.edu.co/bitstreams/7db2a978-57a9-4177-99f5-cc56f619b233/download0a5f525d9cd335cc192b0d907b6b70d6MD58THUMBNAILImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.jpgImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.jpgGenerated Thumbnailimage/jpeg6342https://repositorio.uniandes.edu.co/bitstreams/e0e6fb3f-0524-4b20-b3a4-2e71200c42eb/download7488a4aceb638b823b2732292a0b5307MD57autorizacion tesis - Gabriela Cagua.pdf.jpgautorizacion tesis - Gabriela Cagua.pdf.jpgGenerated Thumbnailimage/jpeg11140https://repositorio.uniandes.edu.co/bitstreams/42e9c4f4-c23a-4cfa-b3d1-1d71bb51bfa0/download9e31af6863da6a452d41f246a3810e6aMD591992/73793oai:repositorio.uniandes.edu.co:1992/737932024-02-16 14:51:47.634http://creativecommons.org/licenses/by/4.0/Attribution 4.0 Internationalembargohttps://repositorio.uniandes.edu.coRepositorio institucional Sénecaadminrepositorio@uniandes.edu.coPGgzPjxzdHJvbmc+RGVzY2FyZ28gZGUgUmVzcG9uc2FiaWxpZGFkIC0gTGljZW5jaWEgZGUgQXV0b3JpemFjacOzbjwvc3Ryb25nPjwvaDM+CjxwPjxzdHJvbmc+UG9yIGZhdm9yIGxlZXIgYXRlbnRhbWVudGUgZXN0ZSBkb2N1bWVudG8gcXVlIHBlcm1pdGUgYWwgUmVwb3NpdG9yaW8gSW5zdGl0dWNpb25hbCBTw6luZWNhIHJlcHJvZHVjaXIgeSBkaXN0cmlidWlyIGxvcyByZWN1cnNvcyBkZSBpbmZvcm1hY2nDs24gZGVwb3NpdGFkb3MgbWVkaWFudGUgbGEgYXV0b3JpemFjacOzbiBkZSBsb3Mgc2lndWllbnRlcyB0w6lybWlub3M6PC9zdHJvbmc+PC9wPgo8cD5Db25jZWRhIGxhIGxpY2VuY2lhIGRlIGRlcMOzc2l0byBlc3TDoW5kYXIgc2VsZWNjaW9uYW5kbyBsYSBvcGNpw7NuIDxzdHJvbmc+J0FjZXB0YXIgbG9zIHTDqXJtaW5vcyBhbnRlcmlvcm1lbnRlIGRlc2NyaXRvcyc8L3N0cm9uZz4geSBjb250aW51YXIgZWwgcHJvY2VzbyBkZSBlbnbDrW8gbWVkaWFudGUgZWwgYm90w7NuIDxzdHJvbmc+J1NpZ3VpZW50ZScuPC9zdHJvbmc+PC9wPgo8aHI+CjxwPllvLCBlbiBtaSBjYWxpZGFkIGRlIGF1dG9yIGRlbCB0cmFiYWpvIGRlIHRlc2lzLCBtb25vZ3JhZsOtYSBvIHRyYWJham8gZGUgZ3JhZG8sIGhhZ28gZW50cmVnYSBkZWwgZWplbXBsYXIgcmVzcGVjdGl2byB5IGRlIHN1cyBhbmV4b3MgZGUgc2VyIGVsIGNhc28sIGVuIGZvcm1hdG8gZGlnaXRhbCB5L28gZWxlY3Ryw7NuaWNvIHkgYXV0b3Jpem8gYSBsYSBVbml2ZXJzaWRhZCBkZSBsb3MgQW5kZXMgcGFyYSBxdWUgcmVhbGljZSBsYSBwdWJsaWNhY2nDs24gZW4gZWwgU2lzdGVtYSBkZSBCaWJsaW90ZWNhcyBvIGVuIGN1YWxxdWllciBvdHJvIHNpc3RlbWEgbyBiYXNlIGRlIGRhdG9zIHByb3BpbyBvIGFqZW5vIGEgbGEgVW5pdmVyc2lkYWQgeSBwYXJhIHF1ZSBlbiBsb3MgdMOpcm1pbm9zIGVzdGFibGVjaWRvcyBlbiBsYSBMZXkgMjMgZGUgMTk4MiwgTGV5IDQ0IGRlIDE5OTMsIERlY2lzacOzbiBBbmRpbmEgMzUxIGRlIDE5OTMsIERlY3JldG8gNDYwIGRlIDE5OTUgeSBkZW3DoXMgbm9ybWFzIGdlbmVyYWxlcyBzb2JyZSBsYSBtYXRlcmlhLCB1dGlsaWNlIGVuIHRvZGFzIHN1cyBmb3JtYXMsIGxvcyBkZXJlY2hvcyBwYXRyaW1vbmlhbGVzIGRlIHJlcHJvZHVjY2nDs24sIGNvbXVuaWNhY2nDs24gcMO6YmxpY2EsIHRyYW5zZm9ybWFjacOzbiB5IGRpc3RyaWJ1Y2nDs24gKGFscXVpbGVyLCBwcsOpc3RhbW8gcMO6YmxpY28gZSBpbXBvcnRhY2nDs24pIHF1ZSBtZSBjb3JyZXNwb25kZW4gY29tbyBjcmVhZG9yIGRlIGxhIG9icmEgb2JqZXRvIGRlbCBwcmVzZW50ZSBkb2N1bWVudG8uPC9wPgo8cD5MYSBwcmVzZW50ZSBhdXRvcml6YWNpw7NuIHNlIGVtaXRlIGVuIGNhbGlkYWQgZGUgYXV0b3IgZGUgbGEgb2JyYSBvYmpldG8gZGVsIHByZXNlbnRlIGRvY3VtZW50byB5IG5vIGNvcnJlc3BvbmRlIGEgY2VzacOzbiBkZSBkZXJlY2hvcywgc2lubyBhIGxhIGF1dG9yaXphY2nDs24gZGUgdXNvIGFjYWTDqW1pY28gZGUgY29uZm9ybWlkYWQgY29uIGxvIGFudGVyaW9ybWVudGUgc2XDsWFsYWRvLiBMYSBwcmVzZW50ZSBhdXRvcml6YWNpw7NuIHNlIGhhY2UgZXh0ZW5zaXZhIG5vIHNvbG8gYSBsYXMgZmFjdWx0YWRlcyB5IGRlcmVjaG9zIGRlIHVzbyBzb2JyZSBsYSBvYnJhIGVuIGZvcm1hdG8gbyBzb3BvcnRlIG1hdGVyaWFsLCBzaW5vIHRhbWJpw6luIHBhcmEgZm9ybWF0byBlbGVjdHLDs25pY28sIHkgZW4gZ2VuZXJhbCBwYXJhIGN1YWxxdWllciBmb3JtYXRvIGNvbm9jaWRvIG8gcG9yIGNvbm9jZXIuPC9wPgo8cD5FbCBhdXRvciwgbWFuaWZpZXN0YSBxdWUgbGEgb2JyYSBvYmpldG8gZGUgbGEgcHJlc2VudGUgYXV0b3JpemFjacOzbiBlcyBvcmlnaW5hbCB5IGxhIHJlYWxpesOzIHNpbiB2aW9sYXIgbyB1c3VycGFyIGRlcmVjaG9zIGRlIGF1dG9yIGRlIHRlcmNlcm9zLCBwb3IgbG8gdGFudG8sIGxhIG9icmEgZXMgZGUgc3UgZXhjbHVzaXZhIGF1dG9yw61hIHkgdGllbmUgbGEgdGl0dWxhcmlkYWQgc29icmUgbGEgbWlzbWEuPC9wPgo8cD5FbiBjYXNvIGRlIHByZXNlbnRhcnNlIGN1YWxxdWllciByZWNsYW1hY2nDs24gbyBhY2Npw7NuIHBvciBwYXJ0ZSBkZSB1biB0ZXJjZXJvIGVuIGN1YW50byBhIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBzb2JyZSBsYSBvYnJhIGVuIGN1ZXN0acOzbiwgZWwgYXV0b3IgYXN1bWlyw6EgdG9kYSBsYSByZXNwb25zYWJpbGlkYWQsIHkgc2FsZHLDoSBkZSBkZWZlbnNhIGRlIGxvcyBkZXJlY2hvcyBhcXXDrSBhdXRvcml6YWRvcywgcGFyYSB0b2RvcyBsb3MgZWZlY3RvcyBsYSBVbml2ZXJzaWRhZCBhY3TDumEgY29tbyB1biB0ZXJjZXJvIGRlIGJ1ZW5hIGZlLjwvcD4KPHA+U2kgdGllbmUgYWxndW5hIGR1ZGEgc29icmUgbGEgbGljZW5jaWEsIHBvciBmYXZvciwgY29udGFjdGUgY29uIGVsIDxhIGhyZWY9Im1haWx0bzpiaWJsaW90ZWNhQHVuaWFuZGVzLmVkdS5jbyIgdGFyZ2V0PSJfYmxhbmsiPkFkbWluaXN0cmFkb3IgZGVsIFNpc3RlbWEuPC9hPjwvcD4K