A 10-Round Attack on Midori-64

Loading...

Date

2025

Journal Title

Journal ISSN

Volume Title

Publisher

Institute of Electrical and Electronics Engineers Inc.

Open Access Color

OpenAIRE Downloads

OpenAIRE Views

relationships.isProjectOf

relationships.isJournalIssueOf

Abstract

Midori is a lightweight block cipher introduced by Banik et al. at ASIACRYPT 2015. It comes in two variants: Midori-64, which has a 64-bit state with 16 rounds, and Midori128, which has a 128 -bit state with 20 rounds. Both use a 128 -bit key. In this work, we present the first truncated differential attack on Midori-64. We construct a 6-round truncated differential by precisely computing the propagation probabilities of specific truncated differences through the cipher's matrix multiplication layer, as well as identifying the positions they may occupy. We also determine its exact probability, with a ratio of approximately 1.85 compared to a random permutation. Using this distinguisher, we mount the first known truncated differential attack on 10 -round Midori-64. Although our attack does not compromise the fullround cipher, it ranks among the most effective known attacks on reduced-round Midori. © 2025 IEEE.

Description

Keywords

Cryptanalysis, Differential Attack, Lightweight Block Cipher, Midori, Midori64, Truncated Differential Attack

Fields of Science

Citation

WoS Q

N/A

Scopus Q

N/A
OpenCitations Logo
OpenCitations Citation Count
N/A

Source

-- 18th International Conference on Information Security and Cryptology, ISCTurkiye 2025 -- 2025-10-22 through 2025-10-23 -- Ankara -- 215330

Volume

Issue

Start Page

End Page

PlumX Metrics
Citations

Scopus : 0

Google Scholar Logo
Google Scholar™

Sustainable Development Goals

SDG data could not be loaded because of an error. Please refresh the page or try again later.