Primitives implemented

cascada.primitives.aes

AES-128.

cascada.primitives.cham

CHAM family of block ciphers.

cascada.primitives.chaskey

Permutation \(\pi\) of Chaskey.

cascada.primitives.feal

FEAL-N cipher.

cascada.primitives.hight

HIGHT cipher.

cascada.primitives.lea

LEA 128-bit cipher.

cascada.primitives.multi2

MULTI2 cipher.

cascada.primitives.noekeon

NOEKEON cipher.

cascada.primitives.picipher

Permutation \(\pi\) of \(\pi\)-Cipher (16-bit version).

cascada.primitives.rectangle

RECTANGLE cipher.

cascada.primitives.shacal1

SHACAL-1 cipher.

cascada.primitives.shacal2

SHACAL-2 cipher (based on SHA-256).

cascada.primitives.simeck

Simeck family of block ciphers.

cascada.primitives.simon

Simon family of block ciphers.

cascada.primitives.speck

Speck family of block ciphers.

cascada.primitives.skinny64

SKINNY-64-64.

cascada.primitives.skinny128

SKINNY-128-128.

cascada.primitives.tea

TEA cipher.

cascada.primitives.xtea

XTEA cipher.

Apart from the suite of tests included in CASCADA, we have tested the search for low-weight characteristics in the primitives listed above by revisiting the following work listing the weights of optimal characteristics covering small number of rounds:

  • XOR differential and linear characteristics of AES [Mou+11, Table4]

  • XOR differential and linear characteristics of CHAM, [Roh+19, Table 10, Table11]

  • linear characteristics of Chaskey [LWR16, Table 4]

  • XOR differential and linear characteristics of HIGHT [Yin+17, Table 4, Table 7],

  • XOR [KLT15, Table1], related-key XOR [Wan+18, Table 5] and RX [Lu+20, Table 5] differential characteristics of Simeck,

  • XOR [LLW17, Table 1] related-key XOR [Wan+18, Table 5] and RX [Lu+20, Table 5] differential characteristics of Simon,

  • XOR differential and linear characteristics of SKINNY [Bei+16, Table 7]

  • XOR differential [BVC16, Table 4] and linear [LWR16, Table 2] characteristics of Speck

  • XOR differential and linear characteristics of RECTANGLE [https://eprint.iacr.org/2019/019, Table 4]

You can find the references of the form NameYear in the paper CASCADA: Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks.