The block cipher Square. In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted that forced us to augment the number of rounds. The goal of this paper is the publication of the resulting cipher for public scrutiny. A C implementation of {sc Square} is available that runs at 2.63 MByte/s on a 100 MHz Pentium. Our M68HC05 Smart Card implementation fits in 547 bytes and takes less than 2 msec. (4 MHz Clock). The high degree of parallellism allows hardware implementations in the Gbit/s range today.

References in zbMATH (referenced in 53 articles )

Showing results 1 to 20 of 53.
Sorted by year (citations)

1 2 3 next

  1. Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi: Improved key recovery attacks on reduced-round AES with practical data and memory complexities (2020)
  2. Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan: Efficient slide attacks (2018)
  3. Cui, Tingting; Chen, Huaifeng; Mesnager, Sihem; Sun, Ling; Wang, Meiqin: Statistical integral distinguisher with multi-structure and its application on AES-like ciphers (2018)
  4. Cui, Tingting; Chen, Huaifeng; Wen, Long; Wang, Meiqin: Statistical integral attack on CAST-256 and IDEA (2018)
  5. Chand Gupta, Kishan; Kumar Pandey, Sumit; Ghosh Ray, Indranil: Applications of design theory for the constructions of MDS matrices for lightweight cryptography (2017)
  6. Chang, Donghoon; Ghosh, Mohona; Gupta, Kishan Chand; Jati, Arpan; Kumar, Abhishek; Moon, Dukjae; Ray, Indranil Ghosh; Sanadhya, Somitra Kumar: SPF: a new family of efficient format-preserving encryption algorithms (2017)
  7. Grassi, Lorenzo; Rechberger, Christian; Rønjom, Sondre: A new structural-differential property of 5-round AES (2017)
  8. Journault, Anthony; Standaert, François-Xavier; Varici, Kerem: Improving the security and efficiency of block ciphers based on LS-designs (2017)
  9. Todo, Yosuke: Integral cryptanalysis on full MISTY1 (2017)
  10. Bar-On, Achiya; Keller, Nathan: A (2^70) attack on the full MISTY1 (2016)
  11. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The (\mathttSKINNY) family of block ciphers and its low-latency variant (\mathttMANTIS) (2016)
  12. Beierle, Christof; Kranz, Thorsten; Leander, Gregor: Lightweight multiplication in (\mathrmGF(2^n)) with applications to MDS matrices (2016)
  13. Biryukov, Alex; Leurent, Gaëtan; Perrin, Léo: Cryptanalysis of Feistel networks with secret round functions (2016)
  14. Boura, Christina; Canteaut, Anne: Another view of the division property (2016)
  15. Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian: Square attack on 7-round Kiasu-BC (2016)
  16. Gueron, Shay; Mouha, Nicky: Simpira v2: a family of efficient permutations using the AES round function (2016)
  17. Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu: Extended meet-in-the-middle attacks on some Feistel constructions (2016)
  18. Guo, Zhiyuan; Wu, Wenling; Gao, Si: Constructing lightweight optimal diffusion primitives with Feistel structure (2016)
  19. Jean, Jérémy; Sasaki, Yu; Wang, Lei: Analysis of the CAESAR candidate silver (2016)
  20. Li, Rongjia; Jin, Chenhui: Meet-in-the-middle attacks on 10-round AES-256 (2016)

1 2 3 next