Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Two Complementary Truncated Differential Attacks on Midori-64

View through CrossRef
The design of lightweight yet secure block ciphers, particularly for resource-constrained platforms such as RFID tags, tiny sensors, or pocket-sized mobile devices, has been a central focus of symmetric encryption research for over two decades. Midori, introduced by Banik et al. at ASIACRYPT 2015, is one of the most cryptanalyzed lightweight block ciphers and comes in two variants: Midori-64 (64-bit state, 16 rounds) and Midori-128 (128-bit state, 20 rounds), both using a 128-bit key.In this work, we extend the security analysis of Midori-64 via truncated differential techniques, providing a clearer understanding of its resistance against such attacks. We construct two 6-round truncated differentials by precisely computing the propagation probabilities of selected truncated differences through the cipher’s matrix-multiplication layer and tracking their diffusion across rounds. We compute their exact probabilities and use them as distinguishers. By exploiting these two distinguishers, we mount two distinct 10-round truncated differential attacks on Midori-64, representing the first truncated differential attacks reported on the cipher. While the full-round design remains secure, one of our attacks ranks among the best known attacks on 10-round Midori-64.
Title: Two Complementary Truncated Differential Attacks on Midori-64
Description:
The design of lightweight yet secure block ciphers, particularly for resource-constrained platforms such as RFID tags, tiny sensors, or pocket-sized mobile devices, has been a central focus of symmetric encryption research for over two decades.
Midori, introduced by Banik et al.
at ASIACRYPT 2015, is one of the most cryptanalyzed lightweight block ciphers and comes in two variants: Midori-64 (64-bit state, 16 rounds) and Midori-128 (128-bit state, 20 rounds), both using a 128-bit key.
In this work, we extend the security analysis of Midori-64 via truncated differential techniques, providing a clearer understanding of its resistance against such attacks.
We construct two 6-round truncated differentials by precisely computing the propagation probabilities of selected truncated differences through the cipher’s matrix-multiplication layer and tracking their diffusion across rounds.
We compute their exact probabilities and use them as distinguishers.
By exploiting these two distinguishers, we mount two distinct 10-round truncated differential attacks on Midori-64, representing the first truncated differential attacks reported on the cipher.
While the full-round design remains secure, one of our attacks ranks among the best known attacks on 10-round Midori-64.

Related Results

Meet-in-the-middle differential fault analysis on Midori
Meet-in-the-middle differential fault analysis on Midori
<abstract><p>Midori is a lightweight block cipher designed by Banik et al. and presented at the ASIACRYPT 2015 conference. According to the block size, it consists of t...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...
One Formalized Approach to Truncated Differential Cryptanalysis of Block Ciphers
One Formalized Approach to Truncated Differential Cryptanalysis of Block Ciphers
Abstract We propose a formalized approach to truncated differential cryptanalysis based on ternary masks that separately account for unchanged, obligatorily changed,...
PERANCANGAN INTERIOR MIDORI JAPANESE RESTAURANT DI TANGERANG
PERANCANGAN INTERIOR MIDORI JAPANESE RESTAURANT DI TANGERANG
Pertumbuhan ekonomi yang tinggi di Jawa Timur memberikan peluang para pengusaha untuk membuka bisnis. Salah satu sektor bisnis yang diminati pengusaha adalah usaha restoran/rumah m...
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Abstract Cyber-Manufacturing Systems (CMS) are vulnerable to cyber-manufacturing attacks ironically because of its very beneficial advance: seamless integration with...
Bayesian Models for Zero Truncated Count Data
Bayesian Models for Zero Truncated Count Data
It is important to fit count data with suitable model(s), models such as Poisson Regression, Quassi Poisson, Negative Binomial, to mention but a few have been adopted by researcher...

Back to Top