Analysis of Sponge Function Based Authenticated Encryption Schemes

被引:0
|
作者
Krishnan, Lekshmi R. [1 ]
Sindhu, M. [1 ]
Srinivasan, Chungath [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
关键词
Sponge Function; Authenticated Encryption; CAESAR Competition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Improvement of authenticated encryption schemes with message linkages for message flows
    Hwang, MS
    Lo, JW
    Hsiao, SY
    Chu, YP
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (04) : 1575 - 1577
  • [42] Comparison of Authenticated-Encryption Schemes in Wireless Sensor Networks
    Simplicio, Marcos A., Jr.
    de Oliveira, Bruno T.
    Barreto, Paulo S. L. M.
    Margi, Cintia B.
    Carvalho, Tereza C. M. B.
    Naslund, Mats
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 450 - 457
  • [43] Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks
    Li, Xiaoqian
    Wang, Peng
    Li, Bao
    Sun, Zhelei
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 395 - 406
  • [44] On the Related-Key Attack Security of Authenticated Encryption Schemes
    Faust, Sebastian
    Kraemer, Juliane
    Orlt, Maximilian
    Struck, Patrick
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
  • [45] Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 85 - 104
  • [46] TriviA and uTriviA: two fast and secure authenticated encryption schemes
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 29 - 48
  • [47] Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
    Nandi, Mridul
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 126 - 140
  • [48] Improvements of authenticated encryption schemes with message linkages for message flows
    Chen, BH
    COMPUTERS & ELECTRICAL ENGINEERING, 2004, 30 (07) : 465 - 469
  • [49] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [50] AEUR: authenticated encryption algorithm design based on uBlock round function
    Yang Y.
    Dong H.
    Liu J.
    Zhang Y.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (08): : 168 - 178