Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications

作者: Guido Bertoni , Joan Daemen , Michaël Peeters , Gilles Van Assche

DOI: 10.1007/978-3-642-28496-0_19

关键词:

摘要: This paper proposes a novel construction, called duplex, closely related to the sponge that accepts message blocks be hashed and---at no extra cost---provides digests on input received so far. It can proven equivalent cascade of functions and hence inherits its security against single-stage generic attacks. The main application proposed here is an authenticated encryption mode based duplex construction. efficient, namely, enciphering authenticating together require only single call underlying permutation per block, readily usable in, e.g., key wrapping. Furthermore, it first this kind directly instead block cipher natively support intermediate tags. construction used efficiently realize other modes, such as reseedable pseudo-random bit sequence generators variant overwrites part state with rather than XOR in.

参考文章(28)
Jian Guo, Thomas Peyrin, Axel Poschmann, The PHOTON family of lightweight Hash functions international cryptology conference. ,vol. 2011, pp. 222- 239 ,(2011) , 10.1007/978-3-642-22792-9_13
Morris Dworkin, Request for Review of Key Wrap Algorithms. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 340- ,(2004)
Andrey Bogdanov, Miroslav Knežević, Gregor Leander, Deniz Toz, Kerem Varıcı, Ingrid Verbauwhede, spongent: A Lightweight Hash Function Cryptographic Hardware and Embedded Systems – CHES 2011. ,vol. 6917, pp. 312- 325 ,(2011) , 10.1007/978-3-642-23951-9_21
Frédéric Muller, Differential Attacks against the Helix Stream Cipher fast software encryption. pp. 94- 108 ,(2004) , 10.1007/978-3-540-25937-4_7
Anand Desai, Alejandro Hevia, Yiqun Lisa Yin, A Practice-Oriented Treatment of Pseudorandom Number Generators international cryptology conference. pp. 368- 383 ,(2002) , 10.1007/3-540-46035-7_24
Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen, The Grindahl hash functions fast software encryption. pp. 39- 57 ,(2007) , 10.1007/978-3-540-74619-5_3
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Sponge-based pseudo-random number generators cryptographic hardware and embedded systems. pp. 33- 47 ,(2010) , 10.1007/978-3-642-15031-9_3
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, On the Indifferentiability of the Sponge Construction Advances in Cryptology – EUROCRYPT 2008. pp. 181- 197 ,(2008) , 10.1007/978-3-540-78967-3_11
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia, QUARK: a lightweight hash cryptographic hardware and embedded systems. pp. 1- 15 ,(2010) , 10.1007/978-3-642-15031-9_1
Michael Gorski, Stefan Lucks, Thomas Peyrin, Slide Attacks on a Class of Hash Functions international conference on the theory and application of cryptology and information security. pp. 143- 160 ,(2008) , 10.1007/978-3-540-89255-7_10