Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed. © 2017 IEEE.
cited By 0; Conference of 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017 ; Conference Date: 6 January 2017 Through 7 January 2017; Conference Code:130103
L. R. Krishnan, Sindhu, M., and Srinivasan, C., “Analysis of sponge function based authenticated encryption schemes”, in 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, 2017.