DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION

被引:0
作者
Hammad, Baraa Tariq [1 ]
Jamil, Norziana [1 ]
Rusli, Mohd Ezanee [1 ]
Zaba, Muhammad Reza [2 ]
机构
[1] Univ Tenaga Nas, Kajang, Malaysia
[2] MIMOS Berhad, Kuala Lumpur, Malaysia
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING | 2017年
关键词
Authenticated Encryption; Sponge construction; Double length;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new DLP-sponge construction to ensure integrity and privacy. This scheme solves problem related to small keys by introducing a double length construction: k approximate to 2r. Previous researcher show that the size of key k must be twice of the capacity c which will in turn affect the size of the underlying permutation: b = c + r. As c decreases, the bitrate r increases as well. Besides that, our scheme is resistant against most of the generic attacks such as multicollision attack with a complexity of t. 22(2( c+3)\2). Therefore, our scheme is better than some of the existing Authenticated Encryption (AE) schemes.
引用
收藏
页码:714 / 721
页数:8
相关论文
共 50 条
  • [41] Authenticated Encryption Based on Finite Automata Cryptosystems
    Salas Pena, Pedro Ivan
    Gonzalez Torres, Raul Ernesto
    2016 13TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2016,
  • [42] Authenticated Encryption in WSN Using eSTREAM Ciphers
    Ahmad, Shakil
    Wahla, Arif
    Kausar, Firdous
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 741 - 749
  • [43] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [44] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
  • [45] Attacks on the Authenticated Encryption Mode of Operation PAE
    Chakraborty, Debrup
    Nandi, Mridul
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) : 5636 - 5642
  • [46] On the security of generalization of threshold signature and authenticated encryption
    Tseng, YM
    Jan, JK
    Chien, HY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
  • [47] Efficient authenticated encryption schemes with public verifiability
    Wang, GL
    Bao, F
    Ma, CS
    Chen, KF
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
  • [48] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [49] Robust authenticated encryption scheme with message linkages
    Yoon, EJ
    Yoo, KY
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 281 - 288
  • [50] Boosting Authenticated Encryption Robustness with Minimal Modifications
    Ashur, Tomer
    Dunkelman, Orr
    Luykx, Atul
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 3 - 33