IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508

This article has now been updated. Please use the final version.

New Distinguishing Attacks on Round-Reduced Sparkle384 and Sparkle512 Permutations
Donghoon CHANGDeukjo HONGJinkeon KANG
Author information
JOURNAL FREE ACCESS Advance online publication

Article ID: 2024EAP1001

Details
Abstract

The Sparkle permutation family is used as an underlying building block of the authenticated encryption scheme Schwaemm, and the hash function Esch which are a part of one of finalists in the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. In this paper, we present distinguishing attacks on 6-round Sparkle384 and 7-round Sparkle512. We used divide-and-conquer approach and the fact that Sparkle permutations are keyless, as a different approach from designers' long trail strategy. Our attack on Sparkle384 requires much lower time complexity than existing best one; our attack on Sparkle512 is best in terms of the number of attacked rounds, as far as we know. However, our results do not controvert the security claim of Sparkle designers.

Content from these authors
© 2024 The Institute of Electronics, Information and Communication Engineers
feedback
Top