DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION

被引:0
|
作者
Hammad, Baraa Tariq [1 ]
Jamil, Norziana [1 ]
Rusli, Mohd Ezanee [1 ]
Zaba, Muhammad Reza [2 ]
机构
[1] Univ Tenaga Nas, Kajang, Malaysia
[2] MIMOS Berhad, Kuala Lumpur, Malaysia
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING | 2017年
关键词
Authenticated Encryption; Sponge construction; Double length;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new DLP-sponge construction to ensure integrity and privacy. This scheme solves problem related to small keys by introducing a double length construction: k approximate to 2r. Previous researcher show that the size of key k must be twice of the capacity c which will in turn affect the size of the underlying permutation: b = c + r. As c decreases, the bitrate r increases as well. Besides that, our scheme is resistant against most of the generic attacks such as multicollision attack with a complexity of t. 22(2( c+3)\2). Therefore, our scheme is better than some of the existing Authenticated Encryption (AE) schemes.
引用
收藏
页码:714 / 721
页数:8
相关论文
共 50 条
  • [1] Analysis of Sponge Function Based Authenticated Encryption Schemes
    Krishnan, Lekshmi R.
    Sindhu, M.
    Srinivasan, Chungath
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [2] Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
    Bhargavi, K. V. L.
    Srinivasan, Chungath
    Lakshmy, K., V
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 49 - 70
  • [3] Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
    Mennink, Bart
    Reyhanitabar, Reza
    Vizar, Damian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 465 - 489
  • [4] Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
    Guo, Chun
    Pereira, Olivier
    Peters, Thomas
    Standaert, Francois-Xavier
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (01) : 6 - 42
  • [5] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    Sasaki, Yu
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 895 - 940
  • [6] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    Journal of Cryptology, 2019, 32 : 895 - 940
  • [7] Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
    Shen, Yaobin
    Peters, Thomas
    Standaert, Francois-Xavier
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (02) : 1 - 34
  • [8] Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme based on the Sponge Function
    Kim, HakJu
    Kim, Kwangjo
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 110 - 111
  • [9] Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction
    Abdoun, Nabil
    El Assad, Safwan
    Manh Hoang, Thang
    Deforges, Olivier
    Assaf, Rima
    Khalil, Mohamad
    SYMMETRY-BASEL, 2021, 13 (12):
  • [10] sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices
    Agrawal, Megha
    Chang, Donghoon
    Sanadhya, Somitra
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 451 - 468