Security of Sponge structures
Authors
Abstract:
Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the previous article, we defined and examined the features of this structure, and in this article, with the focus on the security of sponge structures, we study general analysis methods on this structure and examine their complexities. Considering the complexities introduced for the general attacks, it is necessary to achieve a certain level of security, and therefore this article, both in terms of design and cryptanalysis of sponge-based algorithms plays important role. It is suggested that the article "Sponge structure; introduction and applications" published in this journal be reviewed before reading this article.
similar resources
Post-quantum Security of the Sponge Construction
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengthening of collision-resistance). We show that the sponge construction is collapsing (and in consequence quantum collision-resistant) under suitable assumptions about the underlying block function. In p...
full textSponge-like structures for application in photovoltaics.
Large surface areas at an interface between two different materials are desired in many research fields where the interaction between these materials significantly affects the performance of the physical system. This behaviour is illustrated on sponge-like structures, which assign for such a high surface area, and demonstrate the development from bulk material to thin films and a variety of app...
full textSecurity of Keyed Sponge Constructions Using a Modular Proof Approach
Sponge functions were originally proposed for hashing, but find increasingly more applications in keyed constructions, such as encryption and authentication. Depending on how the key is used we see two main types of keyed sponges in practice: inner and outer -keyed. Earlier security bounds, mostly due to the well-known sponge indifferentiability result, guarantee a security level of c/2 bits wi...
full textCollapsing sponges: Post-quantum security of the sponge construction
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengthening of collision-resistance). We show that the sponge construction is collapsing (and in consequence quantum collision-resistant) under suitable assumptions about the underlying block function. In p...
full textOn the security of the keyed sponge construction
The advantage in differentiating the sponge construction from a random oracle is upper bounded by N22−(c+1), with N the number of calls to the underlying transformation or permutation and c the capacity, resulting in an expected time complexity of N ∼ 2. In this paper we prove that the advantage in distinguishing a keyed sponge from a random oracle is much smaller in typical use cases. In parti...
full textStructures and cytotoxic properties of sponge-derived bisannulated acridines.
A reinvestigation of sponge natural products from additional Indo-Pacific collections of Xestospongiacf. carbonaria and X. cf. exigua has provided further insights on the structures, biological activities, and biosynthetic origin of bisannulated acridines. These alkaloids include one known pyridoacridine, neoamphimedine (2), and three new analogues, 5-methoxyneoamphimedine (4), neoamphimedine Y...
full textMy Resources
Journal title
volume 9 issue 1
pages 62- 51
publication date 2021-04
By following a journal you will be notified via email when a new issue of this journal is published.
No Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023