DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION

被引:0
|
作者
Hammad, Baraa Tariq [1 ]
Jamil, Norziana [1 ]
Rusli, Mohd Ezanee [1 ]
Zaba, Muhammad Reza [2 ]
机构
[1] Univ Tenaga Nas, Kajang, Malaysia
[2] MIMOS Berhad, Kuala Lumpur, Malaysia
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING | 2017年
关键词
Authenticated Encryption; Sponge construction; Double length;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new DLP-sponge construction to ensure integrity and privacy. This scheme solves problem related to small keys by introducing a double length construction: k approximate to 2r. Previous researcher show that the size of key k must be twice of the capacity c which will in turn affect the size of the underlying permutation: b = c + r. As c decreases, the bitrate r increases as well. Besides that, our scheme is resistant against most of the generic attacks such as multicollision attack with a complexity of t. 22(2( c+3)\2). Therefore, our scheme is better than some of the existing Authenticated Encryption (AE) schemes.
引用
收藏
页码:714 / 721
页数:8
相关论文
共 50 条
  • [21] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [22] Authenticated on-line encryption
    Fouque, PA
    Joux, A
    Martinet, G
    Valette, F
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 145 - 159
  • [23] Authenticated Encryption with Key Identification
    Len, Julia
    Grubbs, Paul
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 181 - 209
  • [24] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [25] Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 50819 - 50838
  • [26] Breaking the IOC Authenticated Encryption Mode
    Bottinelli, Paul
    Reyhanitabar, Reza
    Vaudenay, Serge
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 126 - 135
  • [27] Authenticated encryption schemes with message linkage
    Hwang, SJ
    Chang, CC
    Yang, WP
    INFORMATION PROCESSING LETTERS, 1996, 58 (04) : 189 - 194
  • [28] AEGIS: A Fast Authenticated Encryption Algorithm
    Wu, Hongjun
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 185 - 201
  • [29] Hardware Trojan for an Authenticated Encryption Minalpher
    Nozaki, Yusuke
    Ikezaki, Yoshiya
    Yoshikawa, Masaya
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [30] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766