Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both confidentiality and data integrity. There are many AE algorithms in existence today. However, they are often far from ideal in terms of efficiency and ease of use. For this reason, there is ongoing effort to develop new AE algorithms that are secure, efficient, and easy to use. The sponge construction is a relatively new cryptographic primitive that has gained popularity since the sponge-based K ECCAK algorithm won the SHA-3 hashing competition. The duplex construction, which is closely related to the sponge, pro- vides promising potential for secure and efficient authenticated encryption. In this paper we introduce a novel authenticated encryption algorithm based on the duplex construction that is targeted for hardware implementation. We provide explicit customization guidelines for users who desire unique authenticated encryption solutions within our security margins. Our substitution step uses 16 × 16 AES-like S-boxes which are novel because they are the largest bijective S-boxes to be used by an encryption scheme in the literature and are still efficiently implementable in both hardware and software.
Date of creation, presentation, or exhibit
Department, Program, or Center
Computer Science (GCCIS)
Kelly, Matthew; Kaminsky, Alan; Kurdziel, Michael; Lukowiak, Marcin; Radziszowski, Stanislaw, "Customizable sponge-based authenticated encryption using 16-bit S-boxes," in Military Communications Conference, MILCOM 2015 - 2015 IEEE, pp.43-48, 26-28 Oct. 2015 doi: 10.1109/MILCOM.2015.7357416
RIT – Main Campus