:: Volume 8, Issue 1 (9-2019) ::
منادی 2019, 8(1): 15-30 Back to browse issues page
Sponge structure; an introduction and its applications
Abstract:   (2320 Views)
Designing a wide range of encryption algorithms using the sponge structure is reduced only by designing a transform or permutation. Designer specifies a transformation or permutation and then form a hash function, stream cipher, authenticated encryption algorithm and pseudo random number generator. Also, exploiting one single transformation or permutation simplifies the implementation of derived algorithms and gives other advantages such as provable security and better understanding of security of designs. This paper provides a quick introduction to design the sponge structure and explains some cryptographic applications and security requirements.
Keywords: sponge structure, stream cipher, Hash function, authenticated encryption algorithm
Full-Text [PDF 4183 kb]   (428 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2018/11/26 | Accepted: 2019/10/13 | Published: 2020/03/18


XML   Persian Abstract   Print



Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 8, Issue 1 (9-2019) Back to browse issues page