ProgramsView all programs
From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Conference Paper
Publisher : 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017
Source : 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, Institute of Electrical and Electronics Engineers Inc. (2017)
ISBN : 9781509045594
Keywords : Authenticated encryption, Authenticated encryption scheme, Authentication, Confidential message, Cryptography, Literature survey, Message authentication codes, Resourceconstrained devices, Security risks, Sponge functions
Campus : Coimbatore
School : Centre for Cybersecurity Systems and Networks
Department : cyber Security
Year : 2017
Abstract : Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed. © 2017 IEEE.
Cite this Research Publication : L. R. Krishnan, Sindhu, M., and Srinivasan, C., “Analysis of sponge function based authenticated encryption schemes”, in 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, 2017.