DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION

被引:0
|
作者
Hammad, Baraa Tariq [1 ]
Jamil, Norziana [1 ]
Rusli, Mohd Ezanee [1 ]
Zaba, Muhammad Reza [2 ]
机构
[1] Univ Tenaga Nas, Kajang, Malaysia
[2] MIMOS Berhad, Kuala Lumpur, Malaysia
关键词
Authenticated Encryption; Sponge construction; Double length;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new DLP-sponge construction to ensure integrity and privacy. This scheme solves problem related to small keys by introducing a double length construction: k approximate to 2r. Previous researcher show that the size of key k must be twice of the capacity c which will in turn affect the size of the underlying permutation: b = c + r. As c decreases, the bitrate r increases as well. Besides that, our scheme is resistant against most of the generic attacks such as multicollision attack with a complexity of t. 22(2( c+3)\2). Therefore, our scheme is better than some of the existing Authenticated Encryption (AE) schemes.
引用
收藏
页码:714 / 721
页数:8
相关论文
共 50 条
  • [31] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [32] On Committing Authenticated-Encryption
    Chan, John
    Rogaway, Phillip
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 275 - 294
  • [33] RIV for Robust Authenticated Encryption
    Abed, Farzaneh
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 23 - 42
  • [34] Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
    Jimale, Mohamud Ahmed
    Abdullah, Nor Aniza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Z'Aba, Muhammad Reza
    Jamil, Norziana
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2023, 11 : 59661 - 59674
  • [35] Authenticated on-line encryption
    Fouque, PA
    Joux, A
    Martinet, G
    Valette, F
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 145 - 159
  • [36] Authenticated Encryption for FPGA Bitstreams
    Trimberger, Steve
    Moore, Jason
    Lu, Weiguang
    FPGA 11: PROCEEDINGS OF THE 2011 ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD PROGRAMMABLE GATE ARRAYS, 2011, : 83 - 86
  • [37] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [38] Authenticated Encryption with Key Identification
    Len, Julia
    Grubbs, Paul
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 181 - 209
  • [39] Key Rotation for Authenticated Encryption
    Everspaugh, Adam
    Paterson, Kenneth
    Ristenpart, Thomas
    Scott, Sam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 98 - 129
  • [40] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37