Abstract | ||
---|---|---|
Midori128 is a lightweight block cipher proposed at ASI-ACRYPT 2015 to achieve low energy consumption per bit. Currently, the best published impossible differential attack on Midori128 covers 10 rounds without the pre-whitening key. By exploiting the special structure of the S-boxes and the binary linear transformation layer in Midori128, we present impossible differential distinguishers that cover 7 full rounds including the mix column operations. Then, we exploit four of these distinguishers to launch multiple impossible differential attack against 11 rounds of the cipher with the pre-whitening and post-whitening keys. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1587/transfun.E100.A.1733 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES |
Keywords | Field | DocType |
cryptanalysis, impossible differential cryptanalysis, block ciphers, Midori128 | Higher-order differential cryptanalysis,Boomerang attack,Piling-up lemma,Block cipher,Impossible differential cryptanalysis,Algorithm,Theoretical computer science,XSL attack,Linear cryptanalysis,Mathematics,Differential cryptanalysis | Journal |
Volume | Issue | ISSN |
E100A | 8 | 0916-8508 |
Citations | PageRank | References |
0 | 0.34 | 2 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed Tolba | 1 | 20 | 6.35 |
Ahmed Abdelkhalek | 2 | 11 | 4.17 |
Amr Youssef | 3 | 238 | 29.69 |