Analysis of Sponge Function Based Authenticated Encryption Schemes

被引:0
|
作者
Krishnan, Lekshmi R. [1 ]
Sindhu, M. [1 ]
Srinivasan, Chungath [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
关键词
Sponge Function; Authenticated Encryption; CAESAR Competition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme based on the Sponge Function
    Kim, HakJu
    Kim, Kwangjo
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 110 - 111
  • [2] Automated Analysis and Synthesis of Authenticated Encryption Schemes
    Viet Tung Hoang
    Katz, Jonathan
    Malozemoff, Alex J.
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 84 - 95
  • [3] Security Analysis of Two Authenticated Encryption Schemes
    Zhang, Jianhong
    Geng, Qin
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
  • [4] Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
    Bhargavi, K. V. L.
    Srinivasan, Chungath
    Lakshmy, K., V
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 49 - 70
  • [5] DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION
    Hammad, Baraa Tariq
    Jamil, Norziana
    Rusli, Mohd Ezanee
    Zaba, Muhammad Reza
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 714 - 721
  • [6] Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data
    Mazumder, Rashed
    Miyaji, Atsuko
    Su, Chunhua
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 661 - 682
  • [7] Authenticated encryption schemes with message linkage
    Hwang, SJ
    Chang, CC
    Yang, WP
    INFORMATION PROCESSING LETTERS, 1996, 58 (04) : 189 - 194
  • [8] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [9] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766
  • [10] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319