Authenticated Encryption Based on Lesamnta-LW Hashing Mode

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authenticated encryption refers to symmetric cryptography providing both privacy and authenticity. It is most common to construct it as a block-cipher mode of operation. Another promising approach is to construct it based on cryptographic hashing. This paper proposes a nonce-based authenticated encryption scheme based on the Lesamnta-LW hashing mode. Lesamnta-LW is a block-cipher-based iterated hash function, which is specified in the ISO/IEC 29192-5 lightweight hash-function standard. This paper also shows that the proposed scheme is secure if the underlying block cipher is a pseudorandom permutation. Both of the other ISO/IEC 29192-5 mechanisms, PHOTON and SPONGENT, are hardware-oriented sponge-based hash functions, and nonce-based authenticated encryption schemes can also be constructed based on them. On the other hand, Lesamnta-LW is a software-oriented Merkle-Damgård hash function. Thus, the proposed scheme is a new option for authenticated encryption based on lightweight cryptographic hashing.

Cite

CITATION STYLE

APA

Hirose, S., Kuwakado, H., & Yoshida, H. (2020). Authenticated Encryption Based on Lesamnta-LW Hashing Mode. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11975 LNCS, pp. 52–69). Springer. https://doi.org/10.1007/978-3-030-40921-0_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free