APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography

作者: Elena Andreeva , Begül Bilgin , Andrey Bogdanov , Atul Luykx , Bart Mennink

DOI: 10.1007/978-3-662-46706-0_9

关键词:

摘要: The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires either a hardware source randomness, or non-volatile memory store counter. At the same time, lot schemes actually require assumption their security. In paper, we propose APE as first permutation-based authenticated encryption scheme that resistant against misuse. We formally prove secure, based security underlying permutation. To decrypt, processes ciphertext blocks reverse order, and uses inverse permutation calls. therefore both efficient forward instantiate with permutations three recent hash function designs: Quark, Photon, Spongent. For any these permutations, an implementation sup- ports decryption less than 1.9 kGE 2.8 80-bit 128-bit levels, respectively.

参考文章(26)
Hongjun Wu, The Misuse of RC4 in Microsoft Word and Excel. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 7- ,(2005)
Jian Guo, Thomas Peyrin, Axel Poschmann, The PHOTON family of lightweight Hash functions international cryptology conference. ,vol. 2011, pp. 222- 239 ,(2011) , 10.1007/978-3-642-22792-9_13
Andrey Bogdanov, Miroslav Knežević, Gregor Leander, Deniz Toz, Kerem Varıcı, Ingrid Verbauwhede, spongent: A Lightweight Hash Function Cryptographic Hardware and Embedded Systems – CHES 2011. ,vol. 6917, pp. 312- 325 ,(2011) , 10.1007/978-3-642-23951-9_21
Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser, ALE: AES-Based Lightweight Authenticated Encryption Fast Software Encryption. pp. 447- 466 ,(2014) , 10.1007/978-3-662-43933-3_23
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications Selected Areas in Cryptography. pp. 320- 337 ,(2012) , 10.1007/978-3-642-28496-0_19
David A. McGrew, John Viega, The Security and Performance of the Galois/Counter Mode (GCM) of Operation Progress in Cryptology - INDOCRYPT 2004. pp. 343- 355 ,(2004) , 10.1007/978-3-540-30556-9_27
Phillip Rogaway, Nonce-based symmetric encryption fast software encryption. pp. 348- 358 ,(2004) , 10.1007/978-3-540-25937-4_22
Phillip Rogaway, Haibin Zhang, Online ciphers from tweakable blockciphers the cryptographers track at the rsa conference. pp. 237- 249 ,(2011) , 10.1007/978-3-642-19074-2_16
Ewan Fleischmann, Christian Forler, Stefan Lucks, None, McOE: a family of almost foolproof on-line authenticated encryption schemes fast software encryption. pp. 196- 215 ,(2012) , 10.1007/978-3-642-34047-5_12
Thierry P. Berger, Joffrey D’Hayer, Kevin Marquet, Marine Minier, Gaël Thomas, The GLUON Family: A Lightweight Hash Function Family Based on FCSRs Progress in Cryptology - AFRICACRYPT 2012. ,vol. 7374, pp. 306- 323 ,(2012) , 10.1007/978-3-642-31410-0_19