:: Volume 9, Issue 1 (8-2020) ::
3 2020, 9(1): 62-51 Back to browse issues page
Security of Sponge structures
Akram Khalesi, Mohammad Ali Orumiehchiha
Researcher at Research Center for development of advanced technologies
Abstract:   (307 Views)
Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the previous article, we defined and examined the features of this structure, and in this article, with the focus on the security of sponge structures, we study general analysis methods on this structure and examine their complexities. Considering the complexities introduced for the general attacks, it is necessary to achieve a certain level of security, and therefore this article, both in terms of design and cryptanalysis of sponge-based algorithms plays important role. It is suggested that the article "Sponge structure; introduction and applications" published in this journal be reviewed before reading this article.
Keywords: Sponge structure, Cryptographic algorithm based on sponge structure, Collision, preimage, second preimage, internal state recovery, binding output
Full-Text [PDF 1194 kb]   (209 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2020/04/19 | Accepted: 2021/04/4 | Published: 2021/05/10

XML   Persian Abstract   Print

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 9, Issue 1 (8-2020) Back to browse issues page