Loading...

Impossible differential cryptanalysis of reduced-round midori64 block cipher

Rezaei Shahmirzadi, A ; Sharif University of Technology

668 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2017.8488362
  3. Abstract:
  4. Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both versions have key size equal to 128 bits.In this paper, we mainly study security of Midori64. To this end, we use various techniques such as early-abort, memory reallocation, miss-in-the-middle and turning to account the inadequate key schedule algorithm of Midori64. We first show two new 7-round impossible differential characteristics which are, to the best of our knowledge, the longest impossible differential characteristics found for Midori64. Based on the new characteristics, we mount three impossible differential attacks for 10, 11, and 12 rounds on Midori64 with 287.7, 290.63, and 290.51 time complexity, respectively, to retrieve the master-key. © 2017 IEEE
  5. Keywords:
  6. Block cipher ; Impossible differential attack ; Midori ; Chromium compounds ; Energy utilization ; Lyapunov methods ; Scheduling algorithms ; Security of data ; Block ciphers ; Differential attacks ; Differential characteristic ; Impossible differential cryptanalysis ; Lightweight block ciphers ; Low energy consumption ; Midori ; Schedule algorithms ; Cryptography
  7. Source: 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 31-36 ; 9781538665602 (ISBN)
  8. URL: https://ieeexplore.ieee.org/document/8488362