Javascript must be enabled to continue!
Meet-in-the-middle differential fault analysis on Midori
View through CrossRef
<abstract><p>Midori is a lightweight block cipher designed by Banik et al. and presented at the ASIACRYPT 2015 conference. According to the block size, it consists of two algorithms, denoted as Midori-64 and Midori-128. Midori generates 8-bit S-Boxes from 4-bit S-Boxes and applies almost MDS matrices instead of MDS matrices. In this paper, we introduce the meet-in-the-middle fault attack model in the 4-round cell-oriented fault propagation trail and reduce the key space in the last round by $ 2^{45.71} $ and $ 2^{39.86} $ for Midori-64 and Midori-128, respectively. For Midori-64, we reduce the time complexity from $ 2^{80} $ to $ 2^{28} $, $ 2^{32} $ and $ 2^{56} $ for the different single fault injection approaches. For Midori-128, we provide a 4-round fault attack method, which slightly increases the complexity compared to previous attacks. Our results indicate that the first and last four rounds of Midori must be protected to achieve its security.</p></abstract>
American Institute of Mathematical Sciences (AIMS)
Title: Meet-in-the-middle differential fault analysis on Midori
Description:
<abstract><p>Midori is a lightweight block cipher designed by Banik et al.
and presented at the ASIACRYPT 2015 conference.
According to the block size, it consists of two algorithms, denoted as Midori-64 and Midori-128.
Midori generates 8-bit S-Boxes from 4-bit S-Boxes and applies almost MDS matrices instead of MDS matrices.
In this paper, we introduce the meet-in-the-middle fault attack model in the 4-round cell-oriented fault propagation trail and reduce the key space in the last round by $ 2^{45.
71} $ and $ 2^{39.
86} $ for Midori-64 and Midori-128, respectively.
For Midori-64, we reduce the time complexity from $ 2^{80} $ to $ 2^{28} $, $ 2^{32} $ and $ 2^{56} $ for the different single fault injection approaches.
For Midori-128, we provide a 4-round fault attack method, which slightly increases the complexity compared to previous attacks.
Our results indicate that the first and last four rounds of Midori must be protected to achieve its security.
</p></abstract>.
Related Results
Integration Techniques of Fault Detection and Isolation Using Interval Observers
Integration Techniques of Fault Detection and Isolation Using Interval Observers
An interval observer has been illustrated to be a suitable approach to detect and isolate faults affecting complex dynamical industrial systems.
Concerning fault detection, interv...
Deformational Processes Accommodating Slip on an Active Low-Angle Normal Fault, Suckling-Dayman Metamorphic Core Complex, Papua New Guinea
Deformational Processes Accommodating Slip on an Active Low-Angle Normal Fault, Suckling-Dayman Metamorphic Core Complex, Papua New Guinea
<p><b>Detachment faults that can be shown to have slipped at dips <30° in highly extended continental crust are referred to as “Low-Angle Normal Faults” (LANFs). The...
Decomposition and Evolution of Intracontinental Strike‐Slip Faults in Eastern Tibetan Plateau
Decomposition and Evolution of Intracontinental Strike‐Slip Faults in Eastern Tibetan Plateau
Abstract:Little attention had been paid to the intracontinental strike‐slip faults of the Tibetan Plateau. Since the discovery of the Longriba fault using re‐measured GPS data in 2...
Late Quaternary Activity: Kouma Fault
Late Quaternary Activity: Kouma Fault
The Kouma Fault, located at the northern foot of the Mangshan Mountain in Luoyang City, Henan Province, China, is an active fault newly discovered in the field seismic geological s...
Two Complementary Truncated Differential Attacks on Midori-64
Two Complementary Truncated Differential Attacks on Midori-64
The design of lightweight yet secure block ciphers, particularly for resource-constrained platforms such as RFID tags, tiny sensors, or pocket-sized mobile devices, has been a cent...
Analysis of the Influence of Fault Fracture Zone on Mining Response Based on FDM-DEM Coupling
Analysis of the Influence of Fault Fracture Zone on Mining Response Based on FDM-DEM Coupling
Fault slip will cause a change in mining stress at the longwall face, which will cause adverse effects. In this study, on the basis of Fast Lagrangian Analysis of Continua in 3 Dim...
Low-temperature thermochronology of fault zones
Low-temperature thermochronology of fault zones
<p>Thermal signatures as well as timing of fault motions can be constrained by thermochronological analyses of fault-zone rocks (e.g., Tagami, 2012, 2019).&#1...
Structural Characteristics and Evolution Mechanism of Paleogene Faults in the Central Dongying Depression, Bohai Bay Basin
Structural Characteristics and Evolution Mechanism of Paleogene Faults in the Central Dongying Depression, Bohai Bay Basin
Abstract
This study used the growth index, fault activity rate and fault distance burial depth curve methods to analyze the characteristics of fault activity in the central...

