:: Volume 8, Issue 1 (9-2019) ::
3 2019, 8(1): 15-30 Back to browse issues page
Sponge structure; an introduction and its applications
Abstract:   (228 Views)
Designing a wide range of encryption algorithms using the sponge structure is reduced only by designing a transform or permutation. Designer specifies a transformation or permutation and then form a hash function, stream cipher, authenticated encryption algorithm and pseudo random number generator. Also, exploiting one single transformation or permutation simplifies the implementation of derived algorithms and gives other advantages such as provable security and better understanding of security of designs. This paper provides a quick introduction to design the sponge structure and explains some cryptographic applications and security requirements.
Keywords: sponge structure, stream cipher, Hash function, authenticated encryption algorithm
Full-Text [PDF 4183 kb]   (60 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2018/11/26 | Accepted: 2019/10/13 | Published: 2020/03/18


XML   Persian Abstract   Print



Volume 8, Issue 1 (9-2019) Back to browse issues page