[Resource Topic] 2025/636: Impossible Differential Attack on SAND-64

Welcome to the resource topic for 2025/636

Title:
Impossible Differential Attack on SAND-64

Authors: Nobuyuki Sugio

Abstract:

SAND is an AND-RX-based lightweight block cipher proposed by Chen et al. There are two variants of SAND, namely SAND-64 and SAND-128, due to structural differences. In this paper, we search for impossible differential distinguishers of SAND-64 using the Constraint Programming (CP) and reveal 56 types of impossible differential distinguishers up to 11 rounds. Furthermore, we demonstrate a key recovery attack on 17-round SAND-64. The complexities for the attack require 2^{56} data, 2^{127} encryptions, and 2^{60} bytes of memory, respectively. Although this result currently achieves the best attack on round-reduced SAND-64, this attack does not threaten the security of SAND-64 against impossible differential attack.

ePrint: https://eprint.iacr.org/2025/636

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .