z-logo
open-access-imgOpen Access
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
Author(s) -
Tim Beyne,
Yu Long Chen,
Christoph Dobraunig,
Bart Mennink
Publication year - 2020
Publication title -
iacr transaction on symmetric cryptology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.715
H-Index - 10
ISSN - 2519-173X
DOI - 10.46586/tosc.v2020.is1.5-30
Subject(s) - authenticated encryption , computer science , encryption , 56 bit encryption , disk encryption , multiple encryption , link encryption , on the fly encryption , computer network , computer security , embedded system
With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only between these devices and servers, but also the direct communication among these devices. Most authenticated encryption algorithms used in practice are developed to perform well on modern high-end devices, but are not necessarily suited for usage on resource-constrained devices. We present a lightweight authenticated encryption scheme, called Elephant. Elephant retains the advantages of GCM such as parallelism, but is tailored to the needs of resource-constrained devices. The two smallest instances of Elephant, Dumbo and Jumbo, are based on the 160-bit and 176-bit Spongent permutation, respectively, and are particularly suited for hardware; the largest instance of Elephant, Delirium, is based on 200-bit Keccak and is developed towards software use. All three instances are parallelizable, have a small state size while achieving a high level of security, and are constant time by design.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here