This paper proposes a novel construction, called duplex, closely related to the sponge construction, that accepts message blocks to be hashed and-at no extra cost-provides digests on the input blocks received so far. It can be proven equivalent to a cascade of sponge functions and hence inherits its security against single-stage generic attacks. The main application proposed here is an authenticated encryption mode based on the duplex construction. This mode is efficient, namely, enciphering and authenticating together require only a single call to the underlying permutation per block, and is readily usable in, e.g., key wrapping. Furthermore, it is the first mode of this kind to be directly based on a permutation instead of a block cipher and to natively support intermediate tags. The duplex construction can be used to efficiently realize other modes, such as a reseedable pseudo-random bit sequence generators and a sponge variant that overwrites part of the state with the input block rather than to XOR it in. © 2012 Springer-Verlag.
CITATION STYLE
Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2012). Duplexing the sponge: Single-pass authenticated encryption and other applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7118 LNCS, pp. 320–337). https://doi.org/10.1007/978-3-642-28496-0_19
Mendeley helps you to discover research relevant for your work.