Panther: A Sponge Based Lightweight Authenticated Encryption Scheme

被引:3
|
作者
Bhargavi, K. V. L. [1 ]
Srinivasan, Chungath [1 ]
Lakshmy, K., V [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, TIFAC CORE Cyber Secur, Amrita Sch Engn, Coimbatore, Tamil Nadu, India
来源
关键词
Authenticated Encryption (AE); Sponge construction; Authenticated Encryption with Associated Data (AEAD); Lightweight cipher;
D O I
10.1007/978-3-030-92518-5_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the modern era, lots of resource-constrained devices have exploded, creating security issues that conventional cryptographic primitives cannot solve. These devices are connected to an unsecured network such as internet. These lightweight devices not only have limited resources, but also lead to the demand for new lightweight cryptographic primitives with low cost, high performance, low cost of deployment, and effective security outcomes. After reviewing various encryption schemes, designs, and security details, this paper provides a secure cipher Panther, which performs both encryption and authentication using the best components. The design of the Panther is based on a sponge structure using Topelitz matrix and NLFSR (Non-Linear Feedback Shift Register) as the main linear and non-linear components, respectively. Security analysis shows that it is not affected by advanced cryptographic analysis proposed in recent cryptographic literature.
引用
收藏
页码:49 / 70
页数:22
相关论文
共 50 条
  • [31] A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 11 - 14
  • [32] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    Journal of Software, 2010, 5 (07) : 697 - 704
  • [33] Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem
    Li, Fagen
    Qin, Zhiguang
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 266 - 269
  • [34] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919
  • [35] A division-of-labor based threshold authenticated encryption scheme
    Tan Z.-W.
    Fan Y.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1183 - 1194
  • [36] A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2009, 20 (02) : 351 - 359
  • [37] SLAE6: Secure and Lightweight Authenticated Encryption Scheme for 6LoWPAN Networks
    Ashrif, Fatma Foad
    Sundarajan, Elankovan A.
    Ahmed, Rami
    Hasan, Mohammad Kamrul
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, SENSORNETS 2023, 2023, : 67 - 78
  • [38] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [39] Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
    Shen, Yaobin
    Peters, Thomas
    Standaert, Francois-Xavier
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (02) : 1 - 34
  • [40] Lightweight authenticated encryption for embedded on-chip systems
    Hatzivasilis, George
    Floros, George
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 151 - 161