The block cipher Square. In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted that forced us to augment the number of rounds. The goal of this paper is the publication of the resulting cipher for public scrutiny. A C implementation of {sc Square} is available that runs at 2.63 MByte/s on a 100 MHz Pentium. Our M68HC05 Smart Card implementation fits in 547 bytes and takes less than 2 msec. (4 MHz Clock). The high degree of parallellism allows hardware implementations in the Gbit/s range today.

References in zbMATH (referenced in 63 articles )

Showing results 41 to 60 of 63.
Sorted by year (citations)
  1. Li, Ruilin; Li, Chao; Su, Jinshu; Sun, Bing: Security evaluation of MISTY structure with SPN round function (2013)
  2. Minier, Marine; Phan, Raphael C.-W.; Pousse, Benjamin: On integral distinguishers of Rijndael family of ciphers (2012)
  3. Boura, Christina; Canteaut, Anne: Zero-sum distinguishers for iterated permutations and application to Keccak-(f) and Hamsi-256 (2011)
  4. Lu, Jiqiang: The (related-key) impossible boomerang attack and its application to the AES block cipher (2011)
  5. Zhang, Liting; Wu, Wenling; Wang, Peng: Polye+CTR: a swiss-army-knife mode for block ciphers (2011)
  6. Biryukov, Alex; Shamir, Adi: Structural cryptanalysis of SASAS (2010)
  7. Han, Haiqing; Zhang, Huanguo; Li, Qin; Tong, Yan: A generation algorithm of a sort of (P)-permutations (2010)
  8. Kim, Jongsung; Hong, Seokhie; Lim, Jongin: Impossible differential cryptanalysis using matrix method (2010)
  9. Choy, Jiali; Chew, Guanhan; Khoo, Khoongming; Yap, Huihui: Cryptographic properties and application of a generalized unbalanced Feistel network structure (2009)
  10. Collard, B.; Standaert, F.-X.: A statistical saturation attack against the block cipher PRESENT (2009)
  11. Daemen, Joan; Rijmen, Vincent: New criteria for linear maps in AES-like ciphers (2009)
  12. Dinur, Itai; Shamir, Adi: Cube attacks on tweakable black box polynomials (2009)
  13. Minier, Marine; Phan, Raphael C.-W.; Pousse, Benjamin: Distinguishers for ciphers and known key attack against Rijndael with large blocks (2009)
  14. Wei, Yongzhuang; Hu, Yupu: New related-key rectangle attacks on reduced AES-192 and AES-256 (2009)
  15. Khazaei, Shahram; Meier, Willi: New directions in cryptanalysis of self-synchronizing stream ciphers (2008)
  16. Nakahara, Jorge jun.: 3D: A three-dimensional block cipher (2008)
  17. Chen, Jie; Hu, Yupu; Zhang, Yueyu: Impossible differential cryptanalysis of advanced encryption standard (2007)
  18. Chen, Jie; Hu, Yupu; Wei, Yongzhuang: A new method for impossible differential cryptanalysis of 8-round advanced encryption standard (2006)
  19. Standaert, François-Xavier; Piret, Gilles; Gershenfeld, Neil; Quisquater, Jean-Jacques: SEA: a scalable encryption algorithm for small embedded applications (2006)
  20. Youssef, A. M.; Tavares, S. E.; Gong, Guang: On some probabilistic approximations for AES-like S-boxes (2006)