Analysis of Sponge Function Based Authenticated Encryption Schemes

被引:0
|
作者
Krishnan, Lekshmi R. [1 ]
Sindhu, M. [1 ]
Srinivasan, Chungath [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
关键词
Sponge Function; Authenticated Encryption; CAESAR Competition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Lomne, Victor
    Mendel, Florian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 369 - 395
  • [22] Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher
    Hasan, Munawar
    Chang, Donghoon
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14357 - 14369
  • [23] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [24] Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
    Shen, Yaobin
    Peters, Thomas
    Standaert, Francois-Xavier
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (02) : 1 - 34
  • [25] Practical provably-secure authenticated encryption schemes using lattice-based pseudorandom function SPRING
    Boorghany, A.
    Bayat-Sarmadi, S.
    Jalili, R.
    SCIENTIA IRANICA, 2018, 25 (06) : 3442 - 3460
  • [26] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [27] Modeling Memory Faults in Signature and Authenticated Encryption Schemes
    Fischlin, Marc
    Gunther, Felix
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 56 - 84
  • [28] Authenticated encryption schemes with message linkages for message flows
    Tseng, YM
    Jan, JK
    Chien, HY
    COMPUTERS & ELECTRICAL ENGINEERING, 2003, 29 (01) : 101 - 109
  • [29] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [30] Authenticated encryption schemes with message linkage for threshold signatures
    Huang, CH
    Lee, CY
    Lin, CH
    Chang, CC
    Chen, KL
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 261 - 264