The sponge construction as a source of secure cryptographic primitives

被引:0
|
作者
Borowski, Mariusz [1 ]
机构
[1] Mil Commun Inst, Cryptol Div, Zegrze, Poland
关键词
the sponge construction; sponge functions; the duplex construction; authenticated encryption; key wrapping;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of modern cryptography primitives have no provably secure constructions. Their safety is defined on the basis of well-known in the given time cryptanalytic attacks. Moreover, the asymptotic nature of cryptographic definitions (and definitions of complexity theory in general) does not let us say anything about how hard it is to break a given cryptographic primitive for keys of a certain fixed length. Sponge constructions equipped with one ideal permutation and appropriate security parameters are suitable for building provably secure cryptographic primitives. The cryptographic primitives based on sponge and duplex constructions cover most symmetric crypto operations.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Feebly secure cryptographic primitives
    Hirsch E.A.
    Melanich O.
    Nikolenko S.I.
    [J]. Journal of Mathematical Sciences, 2013, 188 (1) : 17 - 34
  • [2] Cryptographic Primitives for Building Secure and Privacy Respecting Protocols
    Camenisch, Jan
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 361 - 361
  • [3] Secure group instant messaging using cryptographic primitives
    Thukral, A
    Zou, X
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1002 - 1011
  • [4] sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives
    AlTawy, Riham
    Rohit, Raghvendra
    He, Morgan
    Mandal, Kalikinkar
    Yang, Gangqiang
    Gong, Guang
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 129 - 150
  • [5] Cryptographic primitives
    Garrett, P
    [J]. PUBLIC-KEY CRYPTOGRAPHY, 2005, 62 : 1 - 62
  • [6] Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
    Lyubashevsky, Vadim
    Palacio, Adriana
    Segev, Gil
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 382 - +
  • [7] A Study of Cryptographic Backdoors in Cryptographic Primitives
    Easttom, Chuck
    [J]. 26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1664 - 1669
  • [8] On the Design of Cryptographic Primitives
    Pino Caballero-Gil
    Amparo Fúster-Sabater
    [J]. Acta Applicandae Mathematica, 2006, 93 : 279 - 297
  • [9] SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
    Abidalrahman Moh’d
    Nauman Aslam
    William Phillips
    William Robertson
    Hosein Marzi
    [J]. Personal and Ubiquitous Computing, 2013, 17 : 1051 - 1059
  • [10] SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
    Moh'd, Abidalrahman
    Aslam, Nauman
    Phillips, William
    Robertson, William
    Marzi, Hosein
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 1051 - 1059