OPPORTUNITIES OF SPONGE CONSTRUCTION IN CRYPTOGRAPHIC SYSTEMS: DESIGN SETTINGS AND SECURITY CONSIDERATIONS
Keywords:
Sponge construction, hash function, security considerationAbstract
Sponge construction has emerged as a versatile and unified structure for designing cryptographic primitives such as hash functions, authenticated encryption with associated data (AEAD), pseudorandom number generators (PRNG), and stream ciphers. This paper analyzes the configurable parameters of sponge construction, including state size, capacity, and rate, and discusses their security implications. A comparative study of existing sponge-based cryptosystems is provided, and general recommendations for design settings are presented to ensure resistance against known attacks while optimizing performance for various applications. The significance of sponge construction in enabling lightweight, secure, and flexible cryptographic solutions is explored, particularly in the context of modern demands such as IoT, embedded systems, and post-quantum resistance.
References
Kundu R., Dutta A. Cryptographic Hash Functions and Attacks-A Detailed Study //International Journal of Advanced Research in Computer Science. – 2020. – Т. 11. – №. 2.
Kampanakis P. et al. Practical challenges with AES-GCM and the need for a new cipher //The Third NIST Workshop on Block Cipher Modes of Operation. – 2023.
Guido B. et al. Cryptographic sponge functions //2011-STMicroelectronics NXP Semiconductors, Version 0.1 January 14. – 2011.
Dobraunig C. et al. Ascon v1. 2: Lightweight authenticated encryption and hashing //Journal of Cryptology. – 2021. – Т. 34. – С. 1-42.
Guido B. et al. Caesar submission: K v2 //Ketjev2-doc2. 0. pdf. – 2014.
Bertoni G. et al. Keccak specifications //Submission to nist (round 2). – 2009. – Т. – №. 30. – С. 320-337.
Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2016). Xoodyak. https://keccak.team/xoodyak.html
Andreeva E. et al. Security of keyed sponge constructions using a modular proof approach //International Workshop on Fast Software Encryption. – Berlin, Heidelberg : Springer Berlin Heidelberg, 2015. – С. 364-384.