DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION

被引:0
作者
Hammad, Baraa Tariq [1 ]
Jamil, Norziana [1 ]
Rusli, Mohd Ezanee [1 ]
Zaba, Muhammad Reza [2 ]
机构
[1] Univ Tenaga Nas, Kajang, Malaysia
[2] MIMOS Berhad, Kuala Lumpur, Malaysia
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING | 2017年
关键词
Authenticated Encryption; Sponge construction; Double length;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new DLP-sponge construction to ensure integrity and privacy. This scheme solves problem related to small keys by introducing a double length construction: k approximate to 2r. Previous researcher show that the size of key k must be twice of the capacity c which will in turn affect the size of the underlying permutation: b = c + r. As c decreases, the bitrate r increases as well. Besides that, our scheme is resistant against most of the generic attacks such as multicollision attack with a complexity of t. 22(2( c+3)\2). Therefore, our scheme is better than some of the existing Authenticated Encryption (AE) schemes.
引用
收藏
页码:714 / 721
页数:8
相关论文
共 50 条
  • [31] The CiliPadi Family of Lightweight Authenticated Encryption, v1.2
    Z'aba, M. R.
    Jamil, N.
    Rohmad, M. S.
    Rani, H. A.
    Shamsuddin, S.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2021, 15 : 1 - 23
  • [32] Authenticated Encryption Based on Finite Automata Cryptosystems
    Salas Pena, Pedro Ivan
    Gonzalez Torres, Raul Ernesto
    2016 13TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2016,
  • [33] Authenticated Encryption in WSN Using eSTREAM Ciphers
    Ahmad, Shakil
    Wahla, Arif
    Kausar, Firdous
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 741 - 749
  • [34] Is RCB a Leakage Resilient Authenticated Encryption Scheme?
    Abed, Farzaneh
    Berti, Francesco
    Lucks, Stefan
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
  • [35] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [36] The Software Performance of Authenticated-Encryption Modes
    Krovetz, Ted
    Rogaway, Phillip
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 306 - 327
  • [37] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    Int. J. Secur. Netw., 2013, 4 (194-199): : 194 - 199
  • [38] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [39] Protecting FPGA Bitstreams Using Authenticated Encryption
    Abdellatif, Karim M.
    Chotin-Avot, R.
    Mehrez, H.
    2013 IEEE 11TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2013,
  • [40] A fundamental flaw in the ++AE authenticated encryption mode
    Al Mahri, Hassan Qahur
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2018, 12 (01) : 37 - 42