Meet-in-the-Middle Attacks on Reduced-Round Midori64

Authors

  • Li Lin TCA Labaratory, State Key Laboratory of Computer Science (SKLCS), Institute of Software, Chinese Academy of Sciences, Beijing, China
  • Wenling Wu TCA Labaratory, State Key Laboratory of Computer Science (SKLCS), Institute of Software, Chinese Academy of Sciences, Beijing, China

DOI:

https://doi.org/10.13154/tosc.v2017.i1.215-239

Keywords:

Block Cipher, Cryptanalysis, Meet-in-the-Middle Attack, Midori64

Abstract

Midori is a lightweight block cipher designed by Banik et al. at ASIACRYPT 2015 to achieve low energy consumption. One version of Midori uses a 64-bit state, another uses a 128-bit state and we denote these versions Midori64 and Midori128. Each of these versions uses a 128-bit key. In this paper, we focus on the key-recovery attacks on reduced-round Midori64 with meet-in-the-middle method. We use the differential enumeration, key-bridging and key-dependent sieve techniques which are popular to analyze AES to attack Midori64. Using key-bridging and key-dependent sieve techniques directly to achieve the complexity lower bound is almost impossible, we give the model on how to achieve the complexity lower bound using these techniques. We also propose the state-bridge technique to use some key relations that are quite complicated and divided by some rounds. With a 6-round distinguisher, we achieve a 10-round attack. After that, by adding one round at the end, we get an 11-round attack. Finally, with a 7-round distinguisher, we get an attack on 12-round Midori64. To the best of our knowledge, these are recently the best attacks on Midori64 in the single-key setting.

Downloads

Published

2017-03-08

How to Cite

Lin, L., & Wu, W. (2017). Meet-in-the-Middle Attacks on Reduced-Round Midori64. IACR Transactions on Symmetric Cryptology, 2017(1), 215–239. https://doi.org/10.13154/tosc.v2017.i1.215-239

Issue

Section

Articles