Analysis of Sponge Function Based Authenticated Encryption Schemes

被引:0
|
作者
Krishnan, Lekshmi R. [1 ]
Sindhu, M. [1 ]
Srinivasan, Chungath [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
关键词
Sponge Function; Authenticated Encryption; CAESAR Competition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] General classification of the authenticated encryption schemes for the CAESAR competition
    Abed, Farzaneh
    Forler, Christian
    Lucks, Stefan
    COMPUTER SCIENCE REVIEW, 2016, 22 : 13 - 26
  • [32] Authenticated encryption schemes with linkage between message blocks
    Lee, WB
    Chang, CC
    INFORMATION PROCESSING LETTERS, 1997, 63 (05) : 247 - 250
  • [33] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [34] Authenticated Encryption Based on SM4 Round Function
    Zhang J.
    Wu W.-L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2018, 46 (06): : 1294 - 1299
  • [35] sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices
    Agrawal, Megha
    Chang, Donghoon
    Sanadhya, Somitra
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 451 - 468
  • [36] Integrity analysis of authenticated encryption based on stream ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 493 - 511
  • [37] Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
    Black, J
    Urtubia, H
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 327 - 338
  • [38] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511
  • [39] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
  • [40] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104