[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
:: Volume 8, Issue 1 (9-2019) ::
3 2019, 8(1): 15-30 Back to browse issues page
Sponge structure; an introduction and its applications
Abstract:   (149 Views)
Designing a wide range of encryption algorithms using the sponge structure is reduced only by designing a transform or permutation. Designer specifies a transformation or permutation and then form a hash function, stream cipher, authenticated encryption algorithm and pseudo random number generator. Also, exploiting one single transformation or permutation simplifies the implementation of derived algorithms and gives other advantages such as provable security and better understanding of security of designs. This paper provides a quick introduction to design the sponge structure and explains some cryptographic applications and security requirements.
Keywords: sponge structure, stream cipher, Hash function, authenticated encryption algorithm
Full-Text [PDF 4183 kb]   (43 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2018/11/26 | Accepted: 2019/10/13 | Published: 2020/03/18
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Sponge structure; an introduction and its applications. 3. 2019; 8 (1) :15-30
URL: http://monadi.isc.org.ir/article-1-130-en.html


Volume 8, Issue 1 (9-2019) Back to browse issues page
دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 31 queries by YEKTAWEB 4102