scispace - formally typeset
Search or ask a question

Showing papers on "Sponge function published in 2007"


Patent
06 Mar 2007
TL;DR: In this article, a recursive security protocol for the protection of digital data is described, in which a bit stream is encrypted with a first encryption algorithm and then associated with a second decryption algorithm.
Abstract: Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.

56 citations


01 Nov 2007
TL;DR: This document specifies the conventions for using the AES-CCM andThe AES-GCM authenticated encryption algorithms with the Cryptographic Message Syntax (CMS) authenticated-enveloped-data content type.
Abstract: This document specifies the conventions for using the AES-CCM and the AES-GCM authenticated encryption algorithms with the Cryptographic Message Syntax (CMS) authenticated-enveloped-data content type. [STANDARDS-TRACK]

37 citations


Journal ArticleDOI
TL;DR: An authenticated encryption scheme with message linkages used to deliver a large message so that the receiver can easily convert the signature into an ordinary one that can be verified by anyone.

14 citations


Posted Content
TL;DR: In this article, a Dragon-MAC Message Authentication Code (MACMC) was proposed to reduce the computational cost of the MAC algorithm. But, the proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computation cost.
Abstract: Sensor networks offer economically viable monitoring solutions for a wide variety of applications. In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Disclosure, disruption and deception threats can be defeated by authenticating data sources as well as encrypting data in transmission. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor’s packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in Telos B wireless sensor nodes.

13 citations


Journal ArticleDOI
TL;DR: The results show that the proposed NDF-PRBG has desirable cryptographic properties, and can be used to construct secure stream ciphers with high speed.
Abstract: Based on the entropy criterion and n-dimensional uniform distribution of nonlinear digital filter (NDF), we present an efficient NDF-based pseudorandom bit generator (NDF-PRBG) for chaotic stream ciphers. The cryptographic properties of the proposed NDF-PRBG are analysed, and some experiments are made. The results show that it has desirable cryptographic properties, and can be used to construct secure stream ciphers with high speed.

3 citations


Proceedings ArticleDOI
02 Apr 2007
TL;DR: This paper proposes a new authenticated encryption scheme which prevents such an attack and then proposes the same scheme in ad-hoc groups based on the proposed authenticatedryption scheme.
Abstract: In 1994, Horster et al. first proposed an authenticated encryption scheme that can have the signature only be verified by the specified recipient while keeping the message secret from the public. Since then, several researchers proposed authenticated encryption schemes in which the recipient can convert the signature into an ordinary one for public verifiability. However, all of these schemes do not consider that once the attacker knows the message then he can also easily convert that signature into an ordinary signature. In this paper, at first we propose a new authenticated encryption scheme which prevents such an attack. We then propose the same scheme in ad-hoc groups based on the proposed authenticated encryption scheme

1 citations


Proceedings ArticleDOI
02 Apr 2007
TL;DR: A cryptosystem that split the message file into different message blocks randomly and then choose the encryption algorithms randomly by using random number generator algorithm (RNGA) for each and every message block, which is also chosen randomly.
Abstract: As the demands for the secure communication grow, cryptographic processing may become a must done situation, in secured message transmission. Random numbers are widely used, especially in cryptography. Any pseudo-random bit stream along with Ex-OR provides a cryptosystem and any good cipher text should look like a pseudo-random bit stream. The proposal of implementing randomization in crypto graphical algorithms is to improve the overall performance by randomizing the standard algorithms and thus to optimize the high-level message security. This paper proposes a cryptosystem that split the message file into different message blocks randomly and then choose the encryption algorithms randomly by using random number generator algorithm (RNGA) for each and every message block, which is also chosen randomly. Also generate the random key by using RNGA for each and every message block. After encrypting all the message blocks, shuffle it using another sequence of random numbers. For decryption, chose the same random numbers and do the reverse process to get the original message file