The cipher SHARK. We present the new block cipher SHARK. This cipher combines highly non-linear substitution boxes and maximum distance separable error correcting codes (MDS-codes) to guarantee a good diffusion. The cipher is resistant against differential and linear cryptanalysis after a small number of rounds. The structure of SHARK is such that a fast software implementation is possible, both for the encryption and the decryption. Our C-implementation of SHARK runs more than four times faster than SAFER and IDEA on a 64-bit architecture.

References in zbMATH (referenced in 19 articles , 1 standard article )

Showing results 1 to 19 of 19.
Sorted by year (citations)

  1. Beyne, Tim: Linear cryptanalysis of FF3-1 and FEA (2021)
  2. Grassi, Lorenzo; L├╝ftenegger, Reinhard; Rechberger, Christian; Rotaru, Dragos; Schofnegger, Markus: On a generalization of substitution-permutation networks: the HADES design strategy (2020)
  3. Gupta, Kishan Chand; Pandey, Sumit Kumar; Venkateswarlu, Ayineedi: Almost involutory recursive MDS diffusion layers (2019)
  4. Chand Gupta, Kishan; Kumar Pandey, Sumit; Ghosh Ray, Indranil: Applications of design theory for the constructions of MDS matrices for lightweight cryptography (2017)
  5. Nguyen Bui Cuong; Nguyen Van Long; Hoang Dinh Linh: Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions (2017)
  6. Malyshev, F. M.; Trifonov, D. I.: Diffusion properties of XSLP-ciphers (2016)
  7. Todo, Yosuke; Aoki, Kazumaro: Wide trail design strategy for binary mixcolumns. Enhancing lower bound of number of active S-boxes (2016)
  8. Gupta, Kishan; Ray, Indranil: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (2015)
  9. Shi, Yang; Fan, Hongfei: On security of a white-box implementation of SHARK (2015)
  10. Bogdanov, Andrey: On unbalanced feistel networks with contracting MDS diffusion (2011)
  11. Han, Haiqing; Zhang, Huanguo; Li, Qin; Tong, Yan: A generation algorithm of a sort of (P)-permutations (2010)
  12. Daemen, Joan; Rijmen, Vincent: New criteria for linear maps in AES-like ciphers (2009)
  13. Nakahara, Jorge jun.: 3D: A three-dimensional block cipher (2008)
  14. Youssef, A. M.; Tavares, S. E.; Gong, Guang: On some probabilistic approximations for AES-like S-boxes (2006)
  15. Fuller, Joanne; Millan, William; Dawson, Ed: Multi-objective optimisation of bijective S-boxes (2005)
  16. Daemen, Joan; Knudsen, Lars; Rijmen, Vincent: The block cipher \textscSquare (1997)
  17. Ding, Cunsheng; Niemi, Valtteri; Renvall, Ari; Salomaa, Arto: \textscTWOPRIME: a fast stream ciphering algorithm (1997)
  18. Jakobsen, Thomas; Knudsen, Lars R.: The interpolation attack on block ciphers (1997)
  19. Rijmen, Vincent; Daemen, Joan; Preneel, Bart; Bosselaers, Antoon; De Win, Erik: The cipher SHARK (1996)