The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Impossible Differential Attack on Reduced Round SPARX-128/256

Muhammad ELSHEIKH, Mohamed TOLBA, Amr M. YOUSSEF

  • Full Text Views

    0

  • Cite this

Summary :

SPARX-128/256 is one of the two versions of the SPARX-128 block cipher family. It has 128-bit block size and 256-bit key size. SPARX has been developed using ARX-based S-boxes with the aim of achieving provable security against single-trail differential and linear cryptanalysis. In this letter, we propose 20-round impossible differential distinguishers for SPARX-128. Then, we utilize these distinguishers to attack 24 rounds (out of 40 rounds) of SPARX-128/256. Our attack has time complexity of 2232 memory accesses, memory complexity of 2160.81 128-bit blocks, and data complexity of 2104 chosen plaintexts.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E101-A No.4 pp.731-733
Publication Date
2018/04/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E101.A.731
Type of Manuscript
LETTER
Category
Cryptography and Information Security

Authors

Muhammad ELSHEIKH
  Concordia University
Mohamed TOLBA
  Concordia University
Amr M. YOUSSEF
  Concordia University

Keyword