DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION

被引:0
|
作者
Hammad, Baraa Tariq [1 ]
Jamil, Norziana [1 ]
Rusli, Mohd Ezanee [1 ]
Zaba, Muhammad Reza [2 ]
机构
[1] Univ Tenaga Nas, Kajang, Malaysia
[2] MIMOS Berhad, Kuala Lumpur, Malaysia
关键词
Authenticated Encryption; Sponge construction; Double length;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new DLP-sponge construction to ensure integrity and privacy. This scheme solves problem related to small keys by introducing a double length construction: k approximate to 2r. Previous researcher show that the size of key k must be twice of the capacity c which will in turn affect the size of the underlying permutation: b = c + r. As c decreases, the bitrate r increases as well. Besides that, our scheme is resistant against most of the generic attacks such as multicollision attack with a complexity of t. 22(2( c+3)\2). Therefore, our scheme is better than some of the existing Authenticated Encryption (AE) schemes.
引用
收藏
页码:714 / 721
页数:8
相关论文
共 50 条
  • [21] Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes
    Kelly, Matthew
    Kaminsky, Alan
    Kurdziel, Michael
    Lukowiak, Marcin
    Radziszowski, Stanislaw
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 43 - 48
  • [22] Publicly verifiable authenticated encryption
    Ma, CS
    Chen, KF
    ELECTRONICS LETTERS, 2003, 39 (03) : 281 - 282
  • [23] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [24] Authenticated Encryption with Variable Stretch
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 396 - 425
  • [25] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [26] WAGE: An Authenticated Encryption with a Twist
    AlTawy, Riham
    Gong, Guang
    Mandal, Kalikinkar
    Rohit, Raghvendra
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 132 - 159
  • [27] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [28] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [29] Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher
    Bellizia, Davide
    Berti, Francesco
    Bronchain, Olivier
    Cassiers, Gaetan
    Duval, Sebastien
    Guo, Chun
    Leander, Gregor
    Leurent, Gaetan
    Levi, Itamar
    Momin, Charles
    Pereira, Olivier
    Peters, Thomas
    Standaert, Francois-Xavier
    Udvarhelyi, Balazs
    Wiemer, Friedrich
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 295 - 349
  • [30] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)