Sponge structure; an introduction and its applications
|
|
|
|
Abstract: (2320 Views) |
Designing a wide range of encryption algorithms using the sponge structure is reduced only by designing a transform or permutation. Designer specifies a transformation or permutation and then form a hash function, stream cipher, authenticated encryption algorithm and pseudo random number generator. Also, exploiting one single transformation or permutation simplifies the implementation of derived algorithms and gives other advantages such as provable security and better understanding of security of designs. This paper provides a quick introduction to design the sponge structure and explains some cryptographic applications and security requirements. |
|
Keywords: sponge structure, stream cipher, Hash function, authenticated encryption algorithm |
|
Full-Text [PDF 4183 kb]
(428 Downloads)
|
Type of Study: Review Article |
Subject:
Special Received: 2018/11/26 | Accepted: 2019/10/13 | Published: 2020/03/18
|
|
|
|