Publication:
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection

dc.citedby0
dc.contributor.authorJimale M.A.en_US
dc.contributor.authorAbdullah N.A.en_US
dc.contributor.authorKiah M.L.B.M.en_US
dc.contributor.authorIdris M.Y.I.en_US
dc.contributor.authorZ'Aba M.R.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorRohmad M.S.en_US
dc.contributor.authorid57440872300en_US
dc.contributor.authorid26659416000en_US
dc.contributor.authorid24833455600en_US
dc.contributor.authorid7005361464en_US
dc.contributor.authorid24726154700en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid24463710800en_US
dc.date.accessioned2024-10-14T03:22:11Z
dc.date.available2024-10-14T03:22:11Z
dc.date.issued2023
dc.description.abstractAuthenticated Encryption (AE) protects confidentiality and integrity at the same time. The sponge construction is based on an iterated permutation or transformation that can be used to implement hashing, and AE schemes, among others. Sponge-based AE schemes offer desirable characteristics like parallelizability and incrementality. In addition, they provide security features such as protection against Chosen Plaintext Attacks, Chosen-Ciphertext Attacks, and Side-Channel Attacks (SCAs). Traditionally AE schemes assume the tag length, also called the stretch, as a fixed parameter per key, and the security is proved according to that assumption. However, the variable tag length per key could happen due to misconfiguration or misuse. In that case, the security would be violated, so it is vital to accommodate variable tag length without sacrificing other desirable features. Reyhanitabar et al. proposed Key Equivalent Separation by Stretch feature and concretized it for protection against tag length misuse attacks in block cipher-based AE schemes. However, the problem remains unresolved for sponge-based constructions, where current sponge-based schemes are vulnerable to tag length variation under the same key attacks. This work aims to bridge this gap by proposing a parallel, sponge-based AE scheme with a variable tag length per key that protects against SCAs and suggesting a lower bound for the recommended tag length. Finally, the security of the proposed scheme is discussed, and its performance is analyzed after implementing the proposed AE scheme in the C programming language. � 2013 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.1109/ACCESS.2023.3267161
dc.identifier.epage59674
dc.identifier.scopus2-s2.0-85153407063
dc.identifier.spage59661
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85153407063&doi=10.1109%2fACCESS.2023.3267161&partnerID=40&md5=593dc191e9104317db7ec57fd5e065b8
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/34735
dc.identifier.volume11
dc.pagecount13
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofAll Open Access
dc.relation.ispartofGold Open Access
dc.sourceScopus
dc.sourcetitleIEEE Access
dc.subjectAuthenticated encryption
dc.subjectintegrity
dc.subjectmessage authentication code
dc.subjectnonce-based AE
dc.subjectparallel AE
dc.subjectprivacy
dc.subjectside-channel attacks
dc.subjectsponge-based AE tag length
dc.subjectvariable stretch
dc.subjectAuthentication
dc.subjectC (programming language)
dc.subjectAuthenticated encryption
dc.subjectCipher
dc.subjectCode
dc.subjectIntegrity
dc.subjectMessage authentication codes
dc.subjectNonce-based authenticated encryption
dc.subjectParallel authenticated encryption
dc.subjectPrivacy
dc.subjectSecurity
dc.subjectSide-channel attacks
dc.subjectSponge-based authenticated encryption
dc.subjectTag length
dc.subjectVariable stretch
dc.subjectSide channel attack
dc.titleSponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protectionen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections