Panther: A Sponge Based Lightweight Authenticated Encryption Scheme

被引:3
|
作者
Bhargavi, K. V. L. [1 ]
Srinivasan, Chungath [1 ]
Lakshmy, K., V [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, TIFAC CORE Cyber Secur, Amrita Sch Engn, Coimbatore, Tamil Nadu, India
来源
PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021 | 2021年 / 13143卷
关键词
Authenticated Encryption (AE); Sponge construction; Authenticated Encryption with Associated Data (AEAD); Lightweight cipher;
D O I
10.1007/978-3-030-92518-5_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the modern era, lots of resource-constrained devices have exploded, creating security issues that conventional cryptographic primitives cannot solve. These devices are connected to an unsecured network such as internet. These lightweight devices not only have limited resources, but also lead to the demand for new lightweight cryptographic primitives with low cost, high performance, low cost of deployment, and effective security outcomes. After reviewing various encryption schemes, designs, and security details, this paper provides a secure cipher Panther, which performs both encryption and authentication using the best components. The design of the Panther is based on a sponge structure using Topelitz matrix and NLFSR (Non-Linear Feedback Shift Register) as the main linear and non-linear components, respectively. Security analysis shows that it is not affected by advanced cryptographic analysis proposed in recent cryptographic literature.
引用
收藏
页码:49 / 70
页数:22
相关论文
共 24 条
  • [1] DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION
    Hammad, Baraa Tariq
    Jamil, Norziana
    Rusli, Mohd Ezanee
    Zaba, Muhammad Reza
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 714 - 721
  • [2] The CiliPadi Family of Lightweight Authenticated Encryption, v1.2
    Z'aba, M. R.
    Jamil, N.
    Rohmad, M. S.
    Rani, H. A.
    Shamsuddin, S.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2021, 15 : 1 - 23
  • [3] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme
    Tan H.
    Shen B.
    Miao X.
    Zhang W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220
  • [4] Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
    Mennink, Bart
    Reyhanitabar, Reza
    Vizar, Damian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 465 - 489
  • [5] HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches
    Song Dat Phuc Tran
    Seok, Byoungjin
    Lee, Changhoon
    APPLIED SOFT COMPUTING, 2020, 97 (97)
  • [6] Xoodyak, a lightweight cryptographic scheme
    Daemen, Joan
    Hoffert, Seth
    Peeters, Michael
    Van Assche, Gilles
    Van Keer, Ronny
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 60 - 87
  • [7] Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm
    Fabinski, Peter
    Farris, Steve
    Kurdziel, Michael
    Lukowiak, Marcin
    Radziszowski, Stanislaw
    2023 30TH INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEM, MIXDES, 2023, : 154 - 159
  • [8] Implementing Lightweight Image/Video Encryption Cores on Xilinx Zynq
    Sadaghiani, Sh M.
    Zolfy, M.
    2020 28TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2020, : 263 - 269
  • [9] A Lightweight Mutual Authentication Scheme for Power Edge Computing system
    Chen, Yi
    Xu, Ai-dong
    Wen, Hong
    Jiang, Yi-xin
    Zhang, Teng-yue
    2019 INTERNATIONAL CONFERENCE ON ENERGY, POWER, ENVIRONMENT AND COMPUTER APPLICATION (ICEPECA 2019), 2019, 334 : 72 - 76
  • [10] Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics
    Shifa, Amna
    Asghar, Mamoona Naveed
    Noor, Salma
    Gohar, Neelam
    Fleury, Martin
    SENSORS, 2019, 19 (05)