2014
DOI: 10.1007/978-3-319-04852-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation

Abstract: Abstract. BLINKER is a light-weight cryptographic suite and record protocol built from a single permutation. Its design is based on the Sponge construction used by the SHA-3 algorithm KECCAK. We examine the SpongeWrap authenticated encryption mode and expand its padding mechanism to offer explicit domain separation and enhanced security for our specific requirements: shared secret half-duplex keying, encryption, and a MAC-and-continue mode. We motivate these enhancements by showing that unlike legacy protocols… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 43 publications
0
15
0
Order By: Relevance
“…Then, the mode is similar to SpongeWrap [19], though using a slightly more involved domain separation system similar to the one of NORX. Due to above observations, our proof readily generalizes to BLNK [82], and thus to CBEAM and STRIBOB.…”
Section: Blnk (Cbeam and Stribob)mentioning
confidence: 65%
See 1 more Smart Citation
“…Then, the mode is similar to SpongeWrap [19], though using a slightly more involved domain separation system similar to the one of NORX. Due to above observations, our proof readily generalizes to BLNK [82], and thus to CBEAM and STRIBOB.…”
Section: Blnk (Cbeam and Stribob)mentioning
confidence: 65%
“…Minaud identified an attack on CBEAM [62], but we focus on the modes of operation. Both modes are based on the BLNK Sponge mode [82], which is depicted in Fig. 4b.…”
Section: Blnk (Cbeam and Stribob)mentioning
confidence: 99%
“…A special padding mode of operation, BLINKER [23], is proposed together with CBEAM. This multi-use padding mode allows full encryption protocols to be built from CBEAM.…”
Section: Padding and Implementation Notesmentioning
confidence: 99%
“…The sponge function π is operated in a MULTIPLEX-like mode in order to achieve maximum flexibility [27]. This way STRIBOB may be used for plain hashing, PRNG generation and in two-party protocols in addition to Authenticated Encryption with Associated Data (AEAD).…”
Section: Sponge Mode and Security Parametersmentioning
confidence: 99%
“…This has clear advantages for performance and implementation footprint, which are especially useful in limited-resource applications. Even full-featured secure communications suites may be constructed from a single permutation [27].…”
Section: Introductionmentioning
confidence: 99%