Title
Impossible Differential Attack On Reduced Round Sparx-64/128
Abstract
SPARX-64/128 is an ARX-based block cipher with 64-bit block size and 128-bit key. It was published in ASIACRYPT 2016 as one of the instantiations of a family of ARX-based block ciphers with provable security against single-characteristic differential and linear crypt-analysis. In this work, we present 12 and 13-round impossible distinguishers on SPARX-64/128 that can be used to attack 15 and 16-round SPARX-64/128 with post-whitening keys, respectively. While the 15-round attack starts from round 0, the 16-round one, exploiting the key schedule, has to start from round 2.
Year
DOI
Venue
2017
10.1007/978-3-319-57339-7_8
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017
Keywords
Field
DocType
Block ciphers, Impossible differential, Miss-in-the-middle, SPARX
Block size,Key schedule,Block cipher,Computer science,Arithmetic,Linear cryptanalysis,Provable security
Conference
Volume
ISSN
Citations 
10239
0302-9743
2
PageRank 
References 
Authors
0.40
6
3
Name
Order
Citations
PageRank
Ahmed Abdelkhalek1114.17
Mohamed Tolba2206.35
Amr Youssef323829.69