Analysis of Sponge Function Based Authenticated Encryption Schemes

被引:0
作者
Krishnan, Lekshmi R. [1 ]
Sindhu, M. [1 ]
Srinivasan, Chungath [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
来源
2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS) | 2017年
关键词
Sponge Function; Authenticated Encryption; CAESAR Competition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 50819 - 50838
  • [22] Integrity analysis of authenticated encryption based on stream ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 493 - 511
  • [23] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511
  • [24] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
  • [25] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [26] Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks
    Li, Xiaoqian
    Wang, Peng
    Li, Bao
    Sun, Zhelei
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 395 - 406
  • [27] Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 85 - 104
  • [28] TriviA and uTriviA: two fast and secure authenticated encryption schemes
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 29 - 48
  • [29] Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
    Nandi, Mridul
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 126 - 140
  • [30] Improvements of authenticated encryption schemes with message linkages for message flows
    Chen, BH
    COMPUTERS & ELECTRICAL ENGINEERING, 2004, 30 (07) : 465 - 469