Publication Type:

Conference Paper

Source:

2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, Institute of Electrical and Electronics Engineers Inc. (2017)

ISBN:

9781509045594

URL:

https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030240067&doi=10.1109%2fICACCS.2017.8014683&partnerID=40&md5=79d104121db4ca63a9d3b7ad740ca4a7

Keywords:

Authenticated encryption, Authenticated encryption scheme, Authentication, Confidential message, Cryptography, Literature survey, Message authentication codes, Resourceconstrained devices, Security risks, Sponge functions

Abstract:

Today's modern communication systems are to be protected from many security risks. Confidential messages sent over an insecure channel should be ensured integrity along with privacy. Authenticated encryption is such a scheme which provides both privacy and integrity simultaneously. Privacy is achieved by means of encryption and authentication using a Message Authentication Code (MAC). For resource-constrained devices, lightweight authenticated encryption schemes are to be devised. Sponge function is an ideal candidate for designing these lightweight schemes. In this paper, a literature survey is made on sponge function based authenticated encryption schemes, their designs and security details. Finally, a comparison of all these schemes is performed. © 2017 IEEE.

Notes:

cited By 0; Conference of 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017 ; Conference Date: 6 January 2017 Through 7 January 2017; Conference Code:130103

Cite this Research Publication

L. R. Krishnan, Sindhu, M., and Srinivasan, C., “Analysis of sponge function based authenticated encryption schemes”, in 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, 2017.

207
PROGRAMS
OFFERED
5
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS