Back close

Analysis of sponge function based authenticated encryption schemes

Publication Type : Conference Paper

Publisher : 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017

Source : 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, Institute of Electrical and Electronics Engineers Inc. (2017)

Url : https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030240067&doi=10.1109%2fICACCS.2017.8014683&partnerID=40&md5=79d104121db4ca63a9d3b7ad740ca4a7

ISBN : 9781509045594

Keywords : Authenticated encryption, Authenticated encryption scheme, Authentication, Confidential message, Cryptography, Literature survey, Message authentication codes, Resourceconstrained devices, Security risks, Sponge functions

Campus : Coimbatore

School : Centre for Cybersecurity Systems and Networks

Department : cyber Security

Year : 2017

Abstract : Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed. © 2017 IEEE.

Cite this Research Publication : L. R. Krishnan, Sindhu, M., and Srinivasan, C., “Analysis of sponge function based authenticated encryption schemes”, in 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, 2017.

Admissions Apply Now