Abstract | ||
---|---|---|
SPARX-64/128 is an ARX-based block cipher with 64-bit block size and 128-bit key. It was published in ASIACRYPT 2016 as one of the instantiations of a family of ARX-based block ciphers with provable security against single-characteristic differential and linear crypt-analysis. In this work, we present 12 and 13-round impossible distinguishers on SPARX-64/128 that can be used to attack 15 and 16-round SPARX-64/128 with post-whitening keys, respectively. While the 15-round attack starts from round 0, the 16-round one, exploiting the key schedule, has to start from round 2. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1007/978-3-319-57339-7_8 | PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017 |
Keywords | Field | DocType |
Block ciphers, Impossible differential, Miss-in-the-middle, SPARX | Block size,Key schedule,Block cipher,Computer science,Arithmetic,Linear cryptanalysis,Provable security | Conference |
Volume | ISSN | Citations |
10239 | 0302-9743 | 2 |
PageRank | References | Authors |
0.40 | 6 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ahmed Abdelkhalek | 1 | 11 | 4.17 |
Mohamed Tolba | 2 | 20 | 6.35 |
Amr Youssef | 3 | 238 | 29.69 |