Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
(ندگان)پدیدآور
Rezaei Shahmirzdi, A.Azimi, A.Salmasizadeh, M.Mohajeri, J.Aref, M. R.نوع مدرک
TextORIGINAL RESEARCH PAPER
زبان مدرک
Englishچکیده
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both versions have key size equal to 128 bits. In this paper, we mainly study security of Midori64. To this end, we use various techniques such as early-abort, memory reallocation, miss-in-the-middle and turning to account the inadequate key schedule algorithm of Midori64. We first show two new 7round impossible differential characteristics which are, to the best of our knowledge, the longest impossible differential characteristics found for Midori64. Based on the new characteristics, we mount three impossible differential attacks for 10, 11, and 12 rounds on Midori64 with 2 87.7 , 2 90.63 , and 2 90.51 time complexity, respectively, to retrieve the master-key.
کلید واژگان
Midoriblock cipher
impossible differential attack
Cryptanalysis
شماره نشریه
1تاریخ نشر
2018-01-011396-10-11
ناشر
Iranian Society of Cryptologyسازمان پدید آورنده
Department of Electrical Engineering, Sharif University of Technology, Tehran, IranDepartment of Electrical Engineering, Sharif University of Technology, Tehran, Iran
Electronics Research Institute, Sharif University of Technology, Tehran, Iran
Electronics Research Institute, Sharif University of Technology, Tehran, Iran
3Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
شاپا
2008-20452008-3076




