On the security of the keyed sponge construction
نویسندگان
چکیده
The advantage in differentiating the sponge construction from a random oracle is upper bounded by N22−(c+1), with N the number of calls to the underlying transformation or permutation and c the capacity, resulting in an expected time complexity of N ∼ 2. In this paper we prove that the advantage in distinguishing a keyed sponge from a random oracle is much smaller in typical use cases. In particular, when the data complexity is limited to M ≪ 2, the expected time complexity is about N ∼ min(2/M, 2|K|), with |K| the length of the key. This improvement over the indifferentiability bound allows decreasing the capacity (and thus the permutation width) for a given required security level or achieving a higher security level for a given capacity. This new bound has positive implications for all applications in which a sponge function is used for encryption and/or authentication, or generally in conjunction with a key, including on platforms with limited resources.
منابع مشابه
Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption
We provide a security analysis for full-state keyed Sponge and full-state Duplex constructions. Our results can be used for making a large class of Sponge-based authenticated encryption schemes more efficient by concurrent absorption of associated data and message blocks. In particular, we introduce and analyze a new variant of SpongeWrap with almost free authentication of associated data. The ...
متن کاملSecurity of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
We provide a security analysis for full-state keyed Sponge and full-state Duplex constructions. Our results can be used for making a large class of Sponge-based authenticated encryption schemes more efficient by concurrent absorption of associated data and message blocks. In particular, we introduce and analyze a new variant of SpongeWrap with almost free authentication of associated data. The ...
متن کاملSecurity of Keyed Sponge Constructions Using a Modular Proof Approach
Sponge functions were originally proposed for hashing, but find increasingly more applications in keyed constructions, such as encryption and authentication. Depending on how the key is used we see two main types of keyed sponges in practice: inner and outer -keyed. Earlier security bounds, mostly due to the well-known sponge indifferentiability result, guarantee a security level of c/2 bits wi...
متن کاملA Keyed Sponge Construction with Pseudorandomness in the Standard Model
The sponge construction, designed by Bertoni, Daemen, Peeters, and Ass cheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spon gent. The designers give a keyed sponge construction by prepending the message with key and prove a bound on its pseudorandomness in the ideal permutation model . In this paper we give a different keyed sponge construction that is based on t...
متن کاملPermutation-based encryption, authentication and authenticated encryption
While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width permutations with modes built on top of the sponge and duplex construction, and our concrete proposal K . Our permutationbased approach is scalable and suitable for high-end CPUs as well as resource-constrained platforms. The la er is illustrated by the small K insta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011