{"title":"Double Length Sponge Construction DLP-Sponge","authors":"B. T. Hammad, N. Jamil, M. Rusli, M. Z’aba","doi":"10.14257/ijsia.2017.11.8.04","DOIUrl":null,"url":null,"abstract":"In this paper, a new sponge construction called DLP-Sponge is proposed, which takes an arbitrary length of input and yields an output of random length. We prove that this construction is resistant against generic attacks such as multicollision attacks with a better complexity 2 2(c+3)/2 even when a small capacity is used, i.e. lightweight cryptography, where c is the capacity. Furthermore, it is used in building other cryptographic primitives such as block cipher, cryptographic hash functions and Message Authentication Codes (MACs).","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.8.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, a new sponge construction called DLP-Sponge is proposed, which takes an arbitrary length of input and yields an output of random length. We prove that this construction is resistant against generic attacks such as multicollision attacks with a better complexity 2 2(c+3)/2 even when a small capacity is used, i.e. lightweight cryptography, where c is the capacity. Furthermore, it is used in building other cryptographic primitives such as block cipher, cryptographic hash functions and Message Authentication Codes (MACs).
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security