scispace - formally typeset
Search or ask a question
Topic

Sponge function

About: Sponge function is a research topic. Over the lifetime, 159 publications have been published within this topic receiving 3919 citations.


Papers
More filters
Proceedings ArticleDOI
11 Jun 2015
TL;DR: New improvements to the A5/1 stream cipher are introduced based on using new technology concepts called sponge function based on combine between the advantage of stream cipher and hash concepts and new S-box generation is proposed to provide the dynamic features to the sponge technology.
Abstract: A5/1 stream cipher is used in Global System for Mobile Communications (GSM) in order to provide privacy on air communication. In this paper introduce new improvements to the A5/1 stream cipher based on using new technology concepts called sponge function. Sponge functions that represent in this paper constructed based on combine between the advantage of stream cipher and hash concepts. New S-box generation is proposed to provide the dynamic features to the sponge technology in order solve the weakness that appear in majority function that used in A5/1 stream cipher by provide dynamic behavior in number of registers and transformation. According the experimental results and the compassion between the A5/1 and the proposed improvement shown the proposed algorithm will increase the randomness features for the A5/l algorithm. The output bit-stream generated by the proposed stream cipher has improved the randomness performance and provide more security to the GSM security algorithm.

3 citations

Patent
15 Jun 2012
TL;DR: In this paper, the authors proposed a method for encryption and decryption synchronization for a communications channel comprising encrypting a communication channel using a data encryption device, the communication channel comprising a data stream having unique information native to the data stream, transmitting the encrypted data stream using a transmitter without applying an additional framing structure or a multiplexing signaling message.
Abstract: A method for encryption and decryption synchronization for a communications channel comprising encrypting a communications channel using a data encryption device, the communications channel comprising a data stream having unique information native to the data stream, transmitting the encrypted data stream using a transmitter without applying an additional framing structure or a multiplexing signaling message after the data stream is encrypted such that the encrypted data stream does not require additional bandwidth to support cryptographic synchronization, receiving by a receiver comprising a decryption device, the transmitted encrypted data stream, and identifying the unique information within the transmitted data stream by iteratively decrypting the encrypted data stream using a processor until a cryptographic parameter is found that results in cryptographic synchronization between the encryption and decryption devices based on a priori knowledge of the unique information within the transmitted data stream.

3 citations

Patent
16 Dec 2013
TL;DR: A pre-encryption process for symmetric encryption processes that inputs a bit stream into any existing or future encryption standard to increase encryption complexity with a disproportionate increase in processing time is described in this paper.
Abstract: A pre-encryption process for symmetric encryption processes that inputs a bit stream into any existing or future encryption standard to increase encryption complexity with a disproportionate increase in processing time. The first encoding step is the two-stage generation of two strong keys based on a seed strong crypto key and known information from the Source Data bit stream. The second step is to split and encode the bit stream based on entropy levels. After entropy coding, the aligned bit streams are multiplexed in a cyclic fashion to generate one resulting bit stream. The third step is to slice the resulting bit stream into blocks, encrypting each block and adding each block to a coded output bit stream. Each new strong crypto key is derived from the previous crypto key and the previous pre-processed bit stream data. The decoding process is provided that is a simplified inverse of the encoding process.

3 citations

Journal ArticleDOI
TL;DR: Several concrete attacks on an authenticated encryption (AE) scheme PAE, which appeared in the IEEE TRANSACTIONS on Information Theory, vol 56, no. 8, pp. 4025-4037, are shown.
Abstract: We show several concrete attacks on an authenticated encryption (AE) scheme PAE, which appeared in the IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 56, no. 8, pp. 4025–4037. In addition, we show some flaws and oversights in the analysis (presented in the same paper) used to prove PAE to be a secure AE scheme.

3 citations

Journal ArticleDOI
TL;DR: This paper discusses recent developments in the area of conventional cryptographic primitives: encryption algorithms, MAC algorithms, and hash functions, and the security level and software performance of these primitives are compared.

3 citations

Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
78% related
Encryption
98.3K papers, 1.4M citations
77% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Authentication
74.7K papers, 867.1K citations
73% related
Access control
32.6K papers, 475K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20211
20203
20195
20186
201714
201616