Differential Cryptanalysis of Round-Reduced Sparx-64/128. / Ankele, Ralph; List, Eik.

ACNS 2018 Applied Cryptography & Network security.. ed. / Bart Preneel; Frederik Vercauteren. Vol. 10892 Leuven, Belgium : Springer International Publishing, 2018. p. 459-475 (Lecture Notes in Computer Science; Vol. 10892).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Differential Cryptanalysis of Round-Reduced Sparx-64/128. / Ankele, Ralph; List, Eik.

ACNS 2018 Applied Cryptography & Network security.. ed. / Bart Preneel; Frederik Vercauteren. Vol. 10892 Leuven, Belgium : Springer International Publishing, 2018. p. 459-475 (Lecture Notes in Computer Science; Vol. 10892).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Ankele, R & List, E 2018, Differential Cryptanalysis of Round-Reduced Sparx-64/128. in B Preneel & F Vercauteren (eds), ACNS 2018 Applied Cryptography & Network security.. vol. 10892, Lecture Notes in Computer Science, vol. 10892, Springer International Publishing, Leuven, Belgium, pp. 459-475. https://doi.org/10.1007/978-3-319-93387-0_24

APA

Ankele, R., & List, E. (2018). Differential Cryptanalysis of Round-Reduced Sparx-64/128. In B. Preneel, & F. Vercauteren (Eds.), ACNS 2018 Applied Cryptography & Network security. (Vol. 10892, pp. 459-475). (Lecture Notes in Computer Science; Vol. 10892). Springer International Publishing. https://doi.org/10.1007/978-3-319-93387-0_24

Vancouver

Ankele R, List E. Differential Cryptanalysis of Round-Reduced Sparx-64/128. In Preneel B, Vercauteren F, editors, ACNS 2018 Applied Cryptography & Network security.. Vol. 10892. Leuven, Belgium: Springer International Publishing. 2018. p. 459-475. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-319-93387-0_24

Author

Ankele, Ralph ; List, Eik. / Differential Cryptanalysis of Round-Reduced Sparx-64/128. ACNS 2018 Applied Cryptography & Network security.. editor / Bart Preneel ; Frederik Vercauteren. Vol. 10892 Leuven, Belgium : Springer International Publishing, 2018. pp. 459-475 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{10ce601c7ff6463db1e6765911b58450,
title = "Differential Cryptanalysis of Round-Reduced Sparx-64/128",
abstract = "Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16. Similar to the wide-trail strategy, the LTS allows provable upper bounds on the length of differential characteristics and linear paths. Thus, the cipher is a highly interesting target for third-party cryptanalysis. However, the only third-party cryptanalysis on Sparx-64/128 to date was given by Abdelkhalek et al. at AFRICACRYPT'17 who proposed impossible-differential attacks on 15 and 16 (out of 24) rounds.In this paper, we present chosen-ciphertext differential attacks on 16 rounds of Sparx-64/128. First, we show a truncated-differential analysis that requires 2^32chosen ciphertexts and approximately 2^93 encryptions. Second, we illustrate the effectiveness of boomerangs on Sparx by a rectangle attack that requires approximately 2^59.6 chosen ciphertexts and about 2^122.2 encryption equivalents. Finally, we also considered a yoyo attack on 16 rounds that, however, requires the full codebook and approximately 2^126 encryption equivalents. ",
keywords = "Symmetric-key cryptography, Cryptanalysis, boomerang, truncated differential, yoyo, ARX",
author = "Ralph Ankele and Eik List",
year = "2018",
doi = "10.1007/978-3-319-93387-0_24",
language = "English",
isbn = "978-3-319-93386-3",
volume = "10892",
series = "Lecture Notes in Computer Science",
publisher = "Springer International Publishing",
pages = "459--475",
editor = "Bart Preneel and Frederik Vercauteren",
booktitle = "ACNS 2018 Applied Cryptography & Network security.",

}

RIS

TY - GEN

T1 - Differential Cryptanalysis of Round-Reduced Sparx-64/128

AU - Ankele, Ralph

AU - List, Eik

PY - 2018

Y1 - 2018

N2 - Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16. Similar to the wide-trail strategy, the LTS allows provable upper bounds on the length of differential characteristics and linear paths. Thus, the cipher is a highly interesting target for third-party cryptanalysis. However, the only third-party cryptanalysis on Sparx-64/128 to date was given by Abdelkhalek et al. at AFRICACRYPT'17 who proposed impossible-differential attacks on 15 and 16 (out of 24) rounds.In this paper, we present chosen-ciphertext differential attacks on 16 rounds of Sparx-64/128. First, we show a truncated-differential analysis that requires 2^32chosen ciphertexts and approximately 2^93 encryptions. Second, we illustrate the effectiveness of boomerangs on Sparx by a rectangle attack that requires approximately 2^59.6 chosen ciphertexts and about 2^122.2 encryption equivalents. Finally, we also considered a yoyo attack on 16 rounds that, however, requires the full codebook and approximately 2^126 encryption equivalents.

AB - Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16. Similar to the wide-trail strategy, the LTS allows provable upper bounds on the length of differential characteristics and linear paths. Thus, the cipher is a highly interesting target for third-party cryptanalysis. However, the only third-party cryptanalysis on Sparx-64/128 to date was given by Abdelkhalek et al. at AFRICACRYPT'17 who proposed impossible-differential attacks on 15 and 16 (out of 24) rounds.In this paper, we present chosen-ciphertext differential attacks on 16 rounds of Sparx-64/128. First, we show a truncated-differential analysis that requires 2^32chosen ciphertexts and approximately 2^93 encryptions. Second, we illustrate the effectiveness of boomerangs on Sparx by a rectangle attack that requires approximately 2^59.6 chosen ciphertexts and about 2^122.2 encryption equivalents. Finally, we also considered a yoyo attack on 16 rounds that, however, requires the full codebook and approximately 2^126 encryption equivalents.

KW - Symmetric-key cryptography

KW - Cryptanalysis

KW - boomerang

KW - truncated differential

KW - yoyo

KW - ARX

UR - https://link.springer.com/chapter/10.1007/978-3-319-93387-0_24

UR - https://eprint.iacr.org/2018/332

U2 - 10.1007/978-3-319-93387-0_24

DO - 10.1007/978-3-319-93387-0_24

M3 - Conference contribution

SN - 978-3-319-93386-3

VL - 10892

T3 - Lecture Notes in Computer Science

SP - 459

EP - 475

BT - ACNS 2018 Applied Cryptography & Network security.

A2 - Preneel, Bart

A2 - Vercauteren, Frederik

PB - Springer International Publishing

CY - Leuven, Belgium

ER -