{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:53:43Z","timestamp":1760151223892,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802437, 61972248, 61902428, 62102448"],"award-info":[{"award-number":["61802437, 61972248, 61902428, 62102448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2020M681314"],"award-info":[{"award-number":["2020M681314"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>This paper introduces a method to construct integral distinguishers for ARX ciphers. The basic idea of this method is to utilize the symmetry between the zero-correlation linear distinguishers and integral distinguishers. Combined with an automatic searching method on zero-correlation linear distinguishers of ARX ciphers, a subspace for the distinguishers is constructed. This subspace can finally be turned into an integral distinguisher based on the symmetry between these two distinguishers. Three ARX block ciphers, HIGHT, LEA and SPECK, are used to validate the effectiveness of this method. For LEA, four nine-round integral distinguishers are constructed, which is one more round than the previous best result derived with division property. For SPECK32, two more six-round integral distinguishers are constructed, whose number of active bits is reduced by one bit.<\/jats:p>","DOI":"10.3390\/sym14030461","type":"journal-article","created":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T21:11:52Z","timestamp":1645737112000},"page":"461","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Another Perspective on Automatic Construction of Integral Distinguishers for ARX Ciphers"],"prefix":"10.3390","volume":"14","author":[{"given":"Kai","family":"Zhang","sequence":"first","affiliation":[{"name":"PLA SSF Information Engineering University, Zhengzhou 450001, China"},{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"}]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.S., Lee, C., Chang, D., Lee, J., and Jeong, K. (2006, January 10\u201313). HIGHT: A new block cipher suitable for low-resource device. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan.","DOI":"10.1007\/11894063_4"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., and Wingers, L. (2015, January 7\u201311). The SIMON and SPECK lightweight block ciphers. Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA.","DOI":"10.1145\/2744769.2747946"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Aumasson, J.P., Meier, W., Phan, R.C.W., and Henzen, L. (2014). The Hash Function BLAKE, Springer.","DOI":"10.1007\/978-3-662-44757-4"},{"key":"ref_4","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., and Walker, J. (2022, January 10). The Skein Hash Function Family. Submission to NIST (Round 3). Available online: https:\/\/www.schneier.com\/wp-content\/uploads\/2016\/02\/skein.pdf."},{"key":"ref_5","unstructured":"Wheeler, D.J., and Needham, R.M. (1993, January 9\u201311). TEA, a tiny encryption algorithm. Proceedings of the International Workshop on Fast Software Encryption, Cambridge, UK."},{"key":"ref_6","unstructured":"Needham, R., and Wheeler, D.J. (1997). Extended Tiny Encryption Algorithm, Computer Laboratory, University of Cambridge. Technical Report."},{"key":"ref_7","unstructured":"Wheeler, D., and Needham, R. (1998). XXTEA: Correction to XTEA, Computer Laboratory, University of Cambridge. Technical Report."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","article-title":"The Salsa20 family of stream ciphers","volume":"Volume 4986","author":"Robshaw","year":"2008","journal-title":"New Stream Cipher Designs"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Daemen, J., Knudsen, L., and Rijmen, V. (1997, January 20\u201322). The block cipher Square. Proceedings of the International Workshop on Fast Software Encryption, Haifa, Israel.","DOI":"10.1007\/BFb0052343"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Knudsen, L., and Wagner, D. (2002, January 4\u20136). Integral cryptanalysis. Proceedings of the International Workshop on Fast Software Encryption, Leuven, Belgium.","DOI":"10.1007\/3-540-45661-9_9"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., and Sung, S. (2003, January 8\u201310). Impossible differential cryptanalysis for block cipher structures. Proceedings of the International Conference on Cryptology in India, New Delhi, India.","DOI":"10.1007\/978-3-540-24582-7_6"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhang, W., Su, B., Wu, W., Feng, D., and Wu, C. (2012, January 26\u201329). Extending higher-order integral: An efficient unified algorithm of constructing integral distinguishers for block ciphers. Proceedings of the International Conference on Applied Cryptography and Network Security, Singapore.","DOI":"10.1007\/978-3-642-31284-7_8"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zhang, H., Wu, W., and Wang, Y. (2015, January 25\u201327). Integral attack against bit-oriented block ciphers. Proceedings of the Information Security and Cryptology, Seoul, Korea.","DOI":"10.1007\/978-3-319-30840-1_7"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Todo, Y. (2015, January 26\u201330). Structural evaluation by generalized integral property. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria.","DOI":"10.1007\/978-3-662-46800-5_12"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Todo, Y., and Morii, M. (2016, January 20\u201323). Bit-based division property and application to simon family. Proceedings of the International Conference on Fast Software Encryption, Bochum, Germany.","DOI":"10.1007\/978-3-662-52993-5_18"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Zhang, W., Bao, Z., and Lin, D. (2016, January 4\u20138). Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ci-phers. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam.","DOI":"10.1007\/978-3-662-53887-6_24"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1049\/iet-ifs.2018.5283","article-title":"MILP-aided bit-based division property for primitives with non-bit-permutation linear layers","volume":"14","author":"Sun","year":"2019","journal-title":"IET Inf. Secur."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wang, S., Hu, B., Guan, J., Zhang, K., and Shi, T. (2019, January 8\u201312). MILP-aided method of searching division property using three subsets and applications. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan.","DOI":"10.1007\/978-3-030-34618-8_14"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hao, Y., Leander, G., Meier, W., Todo, Y., and Wang, Q. (2020, January 10\u201314). Modeling for three-subset division property without unknown subset and improved cube attacks. Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia.","DOI":"10.1007\/978-3-030-45721-1_17"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ghosh, S., and Dunkelman, O. (2021, January 6\u20138). Automatic search for bit-based division property. Proceedings of the International Conference on Cryptology and Information Security in Latin America, Bogot\u00e1, Colombia.","DOI":"10.1007\/978-3-030-88238-9_13"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"ElSheikh, M., and Youssef, A.M. (2021, January 1\u20133). On MILP-based automatic search for bit-based division property for ciphers with (large) linear layers. Proceedings of the Australasian Conference on Information Security and Privacy, Perth, WA, Australia.","DOI":"10.1007\/978-3-030-90567-5_6"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Leander, G., Nyberg, K., and Wang, M. (2012, January 2\u20136). Integral and multidimensional linear distinguishers with correlation zero. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China.","DOI":"10.1007\/978-3-642-34961-4_16"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sun, B., Liu, Z., Rijmen, V., Li, R., Cheng, L., Wang, Q., Alkhzaimi, H., and Li, C. (2015, January 16\u201320). Links among impossible differential, integral and zero correlation linear cryptanalysis. Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-662-47989-6_5"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Wen, L., and Wang, M. (2014, January 7\u20139). Integral zero-correlation distinguisher for ARX block cipher, with application to SHACAL-2. Proceedings of the Australasian Conference on Information Security and Privacy, Wollongong, NSW, Australia.","DOI":"10.1007\/978-3-319-08344-5_32"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sun, L., Wang, W., and Wang, M. (2017, January 3\u20137). Automatic search of bit-based division property for ARX ciphers and word-based divi1sion property. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China.","DOI":"10.1007\/978-3-319-70694-8_5"},{"key":"ref_26","first-page":"118102:1","article-title":"MILP-aided bit-based division property for ARX ciphers","volume":"61","author":"Sun","year":"2017","journal-title":"Sci. China Inf. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Eskandari, Z., Kidmose, A.B., K\u00f6lbl, S., and Tiessen, T. (2018, January 15\u201317). Finding integral distinguishers with ease. Proceedings of the International Conference on Selected Areas in Cryptography, Calgary, AB, Canada.","DOI":"10.1007\/978-3-030-10970-7_6"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Han, Y., Li, Y., and Wang, M. (2018, January 29\u201331). Automatical method for searching integrals of ARX block cipher with division property using three subsets. Proceedings of the International Conference on Information and Communications Security, Lille, France.","DOI":"10.1007\/978-3-030-01950-1_38"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/CC.2018.8300272","article-title":"Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers","volume":"15","author":"Zhang","year":"2018","journal-title":"China Commun."},{"key":"ref_30","unstructured":"Sasaki, Y., and Todo, Y. (May, January 30). New impossible differential search tool from design and cryptanalysis aspects. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Zhang, P., Sun, B., and Li, C. (2009, January 12\u201314). Saturation attack on the block cipher HIGHT. Proceedings of the International Conference on Cryptology and Network Security, Kanazawa, Japan.","DOI":"10.1007\/978-3-642-10433-6_6"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Hong, D., Lee, J.K., Kim, D.C., Kwon, D., Ryu, K.H., and Lee, D.G. (2013, January 19\u201321). LEA: A 128-bit block cipher for fast encryption on common processors. Proceedings of the International Workshop on Information Security Applications, Jeju Island, Korea.","DOI":"10.1007\/978-3-319-05149-9_1"},{"key":"ref_33","first-page":"17","article-title":"Integral attack on reduced-round LEA cipher","volume":"48","author":"Li","year":"2020","journal-title":"Acta Electron. Sin."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/3\/461\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:26:38Z","timestamp":1760135198000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/3\/461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["sym14030461"],"URL":"https:\/\/doi.org\/10.3390\/sym14030461","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2022,2,24]]}}}