Paper 2017/286
Impossible Differential Attack on Midori128 Using Rebound-like Technique
Wenquan Bi, Zheng Li, Xiaoyang Dong, and Xiaoyun Wang
Abstract
Midori is a family of lightweight block cipher proposed by Banik et al. in ASIACRYPT 2015 and it is optimized with respect to the energy consumed by the circuit per bit in encryption or decryption operation. Midori is based on the Substitution-Permutation Network, which has two variants according to the state sizes, i.e. Midori64 and Midori128. It attracted a lot of attention of cryptanalyst since its release. For Midori64, the first meet-in-the-middle attack was proposed by Lin and Wu, which was published on the ToSC 2017 recently. The first impossible differential attack of Midori64 was presented by Chen et al. and Dong gave the first related-key differential attack. Guo et al. introduced an invariant space attack against full-round Midori64 in weak key setting, which was published in ToSC 2017 recently. However, for Midori128, there are only one impossible differential cryptanalysis result proposed by Chen et al. against 10-round reduced Midori128 and one related-key result by Gerault et al. in INDOCRYPT 2016. In this paper, we present a new impossible differential attack on Midori128 by using a new impossible differential proposed by Sasaki et al., we achieve 10-round impossible differential attack with the time complexity
Metadata
- Available format(s)
- -- withdrawn --
- Publication info
- Preprint. MINOR revision.
- Keywords
- cryptanalysislightweight block cipherimpossible differentialMidori128single-key attack
- Contact author(s)
- biwenquan @ mail sdu edu cn
- History
- 2017-11-15: withdrawn
- 2017-04-03: received
- See all versions
- Short URL
- https://ia.cr/2017/286
- License
-
CC BY